diff --git a/.codespellrc b/.codespellrc index d838d23f..e8d19a0a 100644 --- a/.codespellrc +++ b/.codespellrc @@ -1,3 +1,3 @@ [codespell] -skip = .git,target,Cargo.lock +skip = .git,target,Cargo.lock,vendor ignore-words-list = crate,keypair diff --git a/cryptoki-sys/build.rs b/cryptoki-sys/build.rs index b95d6c1f..3bc817d5 100644 --- a/cryptoki-sys/build.rs +++ b/cryptoki-sys/build.rs @@ -15,6 +15,15 @@ mod generate { pub struct CargoCallbacks; impl callbacks::ParseCallbacks for CargoCallbacks { + // skip processing CK_UNAVAILABLE_INFORMATION macro, more details in lib.rs + fn will_parse_macro(&self, name: &str) -> callbacks::MacroParsingBehavior { + if name == "CK_UNAVAILABLE_INFORMATION" { + callbacks::MacroParsingBehavior::Ignore + } else { + callbacks::MacroParsingBehavior::Default + } + } + fn int_macro(&self, name: &str, _: i64) -> Option { let prefixes = [ ("CK_", "CK_ULONG"), @@ -23,16 +32,22 @@ mod generate { ("CKD_", "CK_EC_KDF_TYPE"), ("CKF_", "CK_FLAGS"), ("CKG_MGF1_", "CK_RSA_PKCS_MGF_TYPE"), + ("CKG", "CK_GENERATOR_FUNCTION"), ("CKH_", "CK_HW_FEATURE_TYPE"), ("CKK_", "CK_KEY_TYPE"), ("CKM_", "CK_MECHANISM_TYPE"), ("CKN_", "CK_NOTIFICATION"), ("CKO_", "CK_OBJECT_CLASS"), + ( + "CKP_PKCS5_PBKD2_", + "CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE", + ), ("CKP_", "CK_PROFILE_ID"), ("CKR_", "CK_RV"), ("CKS_", "CK_STATE"), ("CKU_", "CK_USER_TYPE"), - ("CKZ_", "CK_RSA_PKCS_OAEP_SOURCE_TYPE"), + ("CKZ_DATA_SPECIFIED", "CK_RSA_PKCS_OAEP_SOURCE_TYPE"), + ("CKZ_SALT_SPECIFIED", "CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE"), ("CRYPTOKI_VERSION_", "CK_BYTE"), ]; @@ -59,6 +74,8 @@ mod generate { pub fn generate_bindings() { let make_generic: bool = std::env::var_os("MAKE_GENERIC_BINDINGS").is_some(); let mut builder = bindgen::Builder::default(); + // to be fully compatible with 2.4 + builder = builder.header_contents("enable-deprecated.h", "#define PKCS11_DEPRECATED 1\n"); if make_generic { // only WIN32 bindings are "packed". It's easier to "unpack" for other architectures // __declspec is not needed and causes problems @@ -70,7 +87,7 @@ mod generate { } builder = builder - .header("pkcs11.h") + .header("vendor/pkcs11.h") .dynamic_library_name("Pkcs11") // The PKCS11 library works in a slightly different way to most shared libraries. We have // to call `C_GetFunctionList`, which returns a list of pointers to the _actual_ library @@ -79,7 +96,7 @@ mod generate { // This is needed because no types will be generated if `allowlist_function` is used. // Unsure if this is a bug. .allowlist_type("*") - .allowlist_file("pkcs11.h") + .allowlist_file("vendor/pkcs11.h") // See this issue: https://github.com/parallaxsecond/rust-cryptoki/issues/12 .blocklist_type("max_align_t") // Derive the `Debug` trait for the generated structs where possible. diff --git a/cryptoki-sys/pkcs11.h b/cryptoki-sys/pkcs11.h deleted file mode 100644 index 3d531134..00000000 --- a/cryptoki-sys/pkcs11.h +++ /dev/null @@ -1,1752 +0,0 @@ -/* pkcs11.h - Copyright 2006, 2007 g10 Code GmbH - Copyright 2006 Andreas Jellinghaus - Copyright 2017 Red Hat, Inc. - - This file is free software; as a special exception the author gives - unlimited permission to copy and/or distribute it, with or without - modifications, as long as this notice is preserved. - - This file is distributed in the hope that it will be useful, but - WITHOUT ANY WARRANTY, to the extent permitted by law; without even - the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR - PURPOSE. */ - -/* Please submit any changes back to the p11-kit project at - https://github.com/p11-glue/p11-kit/, so that - they can be picked up by other projects from there as well. */ - -/* This file is a modified implementation of the PKCS #11 standard by - OASIS group. It is mostly a drop-in replacement, with the - following change: - - This header file does not require any macro definitions by the user - (like CK_DEFINE_FUNCTION etc). In fact, it defines those macros - for you (if useful, some are missing, let me know if you need - more). - - There is an additional API available that does comply better to the - GNU coding standard. It can be switched on by defining - CRYPTOKI_GNU before including this header file. For this, the - following changes are made to the specification: - - All structure types are changed to a "struct ck_foo" where CK_FOO - is the type name in PKCS #11. - - All non-structure types are changed to ck_foo_t where CK_FOO is the - lowercase version of the type name in PKCS #11. The basic types - (CK_ULONG et al.) are removed without substitute. - - All members of structures are modified in the following way: Type - indication prefixes are removed, and underscore characters are - inserted before words. Then the result is lowercased. - - Note that function names are still in the original case, as they - need for ABI compatibility. - - CK_FALSE, CK_TRUE and NULL_PTR are removed without substitute. Use - . - - If CRYPTOKI_COMPAT is defined before including this header file, - then none of the API changes above take place, and the API is the - one defined by the PKCS #11 standard. */ - -#ifndef PKCS11_H -#define PKCS11_H 1 - -#if defined(__cplusplus) -extern "C" { -#endif - - -/* The version of cryptoki we implement. The revision is changed with - each modification of this file. */ -#define CRYPTOKI_VERSION_MAJOR 2 -#define CRYPTOKI_VERSION_MINOR 40 -#define P11_KIT_CRYPTOKI_VERSION_REVISION 0 - - -/* Compatibility interface is default, unless CRYPTOKI_GNU is - given. */ -#ifndef CRYPTOKI_GNU -#ifndef CRYPTOKI_COMPAT -#define CRYPTOKI_COMPAT 1 -#endif -#endif - -/* System dependencies. */ - -#if defined(_WIN32) || defined(CRYPTOKI_FORCE_WIN32) - -/* There is a matching pop below. */ -#pragma pack(push, cryptoki, 1) - -#ifdef CRYPTOKI_EXPORTS -#define CK_SPEC __declspec(dllexport) -#else -#define CK_SPEC __declspec(dllimport) -#endif - -#else - -#define CK_SPEC - -#endif - - -#ifdef CRYPTOKI_COMPAT - /* If we are in compatibility mode, switch all exposed names to the - PKCS #11 variant. There are corresponding #undefs below. */ - -#define ck_flags_t CK_FLAGS -#define ck_version _CK_VERSION - -#define ck_info _CK_INFO -#define cryptoki_version cryptokiVersion -#define manufacturer_id manufacturerID -#define library_description libraryDescription -#define library_version libraryVersion - -#define ck_notification_t CK_NOTIFICATION -#define ck_slot_id_t CK_SLOT_ID - -#define ck_slot_info _CK_SLOT_INFO -#define slot_description slotDescription -#define hardware_version hardwareVersion -#define firmware_version firmwareVersion - -#define ck_token_info _CK_TOKEN_INFO -#define serial_number serialNumber -#define max_session_count ulMaxSessionCount -#define session_count ulSessionCount -#define max_rw_session_count ulMaxRwSessionCount -#define rw_session_count ulRwSessionCount -#define max_pin_len ulMaxPinLen -#define min_pin_len ulMinPinLen -#define total_public_memory ulTotalPublicMemory -#define free_public_memory ulFreePublicMemory -#define total_private_memory ulTotalPrivateMemory -#define free_private_memory ulFreePrivateMemory -#define utc_time utcTime - -#define ck_session_handle_t CK_SESSION_HANDLE -#define ck_user_type_t CK_USER_TYPE -#define ck_state_t CK_STATE - -#define ck_session_info _CK_SESSION_INFO -#define slot_id slotID -#define device_error ulDeviceError - -#define ck_object_handle_t CK_OBJECT_HANDLE -#define ck_object_class_t CK_OBJECT_CLASS -#define ck_hw_feature_type_t CK_HW_FEATURE_TYPE -#define ck_key_type_t CK_KEY_TYPE -#define ck_certificate_type_t CK_CERTIFICATE_TYPE -#define ck_attribute_type_t CK_ATTRIBUTE_TYPE - -#define ck_attribute _CK_ATTRIBUTE -#define value pValue -#define value_len ulValueLen - -#define count ulCount - -#define ck_date _CK_DATE - -#define ck_mechanism_type_t CK_MECHANISM_TYPE - -#define ck_mechanism _CK_MECHANISM -#define parameter pParameter -#define parameter_len ulParameterLen - -#define params pParams - -#define ck_mechanism_info _CK_MECHANISM_INFO -#define min_key_size ulMinKeySize -#define max_key_size ulMaxKeySize - -#define ck_param_type CK_PARAM_TYPE -#define ck_otp_param CK_OTP_PARAM -#define ck_otp_params CK_OTP_PARAMS -#define ck_otp_signature_info CK_OTP_SIGNATURE_INFO - -#define ck_rv_t CK_RV -#define ck_notify_t CK_NOTIFY - -#define ck_function_list _CK_FUNCTION_LIST - -#define ck_createmutex_t CK_CREATEMUTEX -#define ck_destroymutex_t CK_DESTROYMUTEX -#define ck_lockmutex_t CK_LOCKMUTEX -#define ck_unlockmutex_t CK_UNLOCKMUTEX - -#define ck_c_initialize_args _CK_C_INITIALIZE_ARGS -#define create_mutex CreateMutex -#define destroy_mutex DestroyMutex -#define lock_mutex LockMutex -#define unlock_mutex UnlockMutex -#define reserved pReserved - -#define ck_rsa_pkcs_mgf_type_t CK_RSA_PKCS_MGF_TYPE -#define ck_rsa_pkcs_oaep_source_type_t CK_RSA_PKCS_OAEP_SOURCE_TYPE -#define hash_alg hashAlg -#define s_len sLen -#define source_data pSourceData -#define source_data_len ulSourceDataLen - -#define counter_bits ulCounterBits -#define iv_ptr pIv -#define iv_len ulIvLen -#define iv_bits ulIvBits -#define aad_ptr pAAD -#define aad_len ulAADLen -#define tag_bits ulTagBits -#define shared_data_len ulSharedDataLen -#define shared_data pSharedData -#define public_data_len ulPublicDataLen -#define public_data pPublicData -#define string_data pData -#define string_data_len ulLen -#define data_params pData -#endif /* CRYPTOKI_COMPAT */ - - - -typedef unsigned long ck_flags_t; - -struct ck_version -{ - unsigned char major; - unsigned char minor; -}; - - -struct ck_info -{ - struct ck_version cryptoki_version; - unsigned char manufacturer_id[32]; - ck_flags_t flags; - unsigned char library_description[32]; - struct ck_version library_version; -}; - - -typedef unsigned long ck_notification_t; - -const unsigned long CKN_SURRENDER = 0UL; - - -typedef unsigned long ck_slot_id_t; - - -struct ck_slot_info -{ - unsigned char slot_description[64]; - unsigned char manufacturer_id[32]; - ck_flags_t flags; - struct ck_version hardware_version; - struct ck_version firmware_version; -}; - -const unsigned long CKF_TOKEN_PRESENT = 1UL << 0; -const unsigned long CKF_REMOVABLE_DEVICE = 1UL << 1; -const unsigned long CKF_HW_SLOT = 1UL << 2; -const unsigned long CKF_ARRAY_ATTRIBUTE = 1UL << 30; - -struct ck_token_info -{ - unsigned char label[32]; - unsigned char manufacturer_id[32]; - unsigned char model[16]; - unsigned char serial_number[16]; - ck_flags_t flags; - unsigned long max_session_count; - unsigned long session_count; - unsigned long max_rw_session_count; - unsigned long rw_session_count; - unsigned long max_pin_len; - unsigned long min_pin_len; - unsigned long total_public_memory; - unsigned long free_public_memory; - unsigned long total_private_memory; - unsigned long free_private_memory; - struct ck_version hardware_version; - struct ck_version firmware_version; - unsigned char utc_time[16]; -}; - - -#define CKF_RNG (1UL << 0) -#define CKF_WRITE_PROTECTED (1UL << 1) -#define CKF_LOGIN_REQUIRED (1UL << 2) -#define CKF_USER_PIN_INITIALIZED (1UL << 3) -#define CKF_RESTORE_KEY_NOT_NEEDED (1UL << 5) -#define CKF_CLOCK_ON_TOKEN (1UL << 6) -#define CKF_PROTECTED_AUTHENTICATION_PATH (1UL << 8) -#define CKF_DUAL_CRYPTO_OPERATIONS (1UL << 9) -#define CKF_TOKEN_INITIALIZED (1UL << 10) -#define CKF_SECONDARY_AUTHENTICATION (1UL << 11) -#define CKF_USER_PIN_COUNT_LOW (1UL << 16) -#define CKF_USER_PIN_FINAL_TRY (1UL << 17) -#define CKF_USER_PIN_LOCKED (1UL << 18) -#define CKF_USER_PIN_TO_BE_CHANGED (1UL << 19) -#define CKF_SO_PIN_COUNT_LOW (1UL << 20) -#define CKF_SO_PIN_FINAL_TRY (1UL << 21) -#define CKF_SO_PIN_LOCKED (1UL << 22) -#define CKF_SO_PIN_TO_BE_CHANGED (1UL << 23) -#define CKF_ERROR_STATE (1UL << 24) - -#define CK_UNAVAILABLE_INFORMATION ((unsigned long)-1L) -#define CK_EFFECTIVELY_INFINITE (0UL) - - -typedef unsigned long ck_session_handle_t; - -#define CK_INVALID_HANDLE (0UL) - - -typedef unsigned long ck_user_type_t; - -#define CKU_SO (0UL) -#define CKU_USER (1UL) -#define CKU_CONTEXT_SPECIFIC (2UL) - - -typedef unsigned long ck_state_t; - -#define CKS_RO_PUBLIC_SESSION (0UL) -#define CKS_RO_USER_FUNCTIONS (1UL) -#define CKS_RW_PUBLIC_SESSION (2UL) -#define CKS_RW_USER_FUNCTIONS (3UL) -#define CKS_RW_SO_FUNCTIONS (4UL) - - -struct ck_session_info -{ - ck_slot_id_t slot_id; - ck_state_t state; - ck_flags_t flags; - unsigned long device_error; -}; - -#define CKF_RW_SESSION (1UL << 1) -#define CKF_SERIAL_SESSION (1UL << 2) - - -typedef unsigned long ck_object_handle_t; - - -typedef unsigned long ck_object_class_t; - -#define CKO_DATA (0UL) -#define CKO_CERTIFICATE (1UL) -#define CKO_PUBLIC_KEY (2UL) -#define CKO_PRIVATE_KEY (3UL) -#define CKO_SECRET_KEY (4UL) -#define CKO_HW_FEATURE (5UL) -#define CKO_DOMAIN_PARAMETERS (6UL) -#define CKO_MECHANISM (7UL) -#define CKO_OTP_KEY (8UL) -#define CKO_VENDOR_DEFINED ((unsigned long) (1UL << 31)) - - -typedef unsigned long ck_hw_feature_type_t; - -#define CKH_MONOTONIC_COUNTER (1UL) -#define CKH_CLOCK (2UL) -#define CKH_USER_INTERFACE (3UL) -#define CKH_VENDOR_DEFINED ((unsigned long) (1UL << 31)) - - -typedef unsigned long ck_key_type_t; - -#define CKK_RSA (0UL) -#define CKK_DSA (1UL) -#define CKK_DH (2UL) -#define CKK_ECDSA (3UL) -#define CKK_EC (3UL) -#define CKK_X9_42_DH (4UL) -#define CKK_KEA (5UL) -#define CKK_GENERIC_SECRET (0x10UL) -#define CKK_RC2 (0x11UL) -#define CKK_RC4 (0x12UL) -#define CKK_DES (0x13UL) -#define CKK_DES2 (0x14UL) -#define CKK_DES3 (0x15UL) -#define CKK_CAST (0x16UL) -#define CKK_CAST3 (0x17UL) -#define CKK_CAST128 (0x18UL) -#define CKK_RC5 (0x19UL) -#define CKK_IDEA (0x1aUL) -#define CKK_SKIPJACK (0x1bUL) -#define CKK_BATON (0x1cUL) -#define CKK_JUNIPER (0x1dUL) -#define CKK_CDMF (0x1eUL) -#define CKK_AES (0x1fUL) -#define CKK_BLOWFISH (0x20UL) -#define CKK_TWOFISH (0x21UL) -#define CKK_SECURID (0x22UL) -#define CKK_HOTP (0x23UL) -#define CKK_ACTI (0x24UL) -#define CKK_CAMELLIA (0x25UL) -#define CKK_ARIA (0x26UL) -#define CKK_MD5_HMAC (0x27UL) -#define CKK_SHA_1_HMAC (0x28UL) -#define CKK_RIPEMD128_HMAC (0x29UL) -#define CKK_RIPEMD160_HMAC (0x2aUL) -#define CKK_SHA256_HMAC (0x2bUL) -#define CKK_SHA384_HMAC (0x2cUL) -#define CKK_SHA512_HMAC (0x2dUL) -#define CKK_SHA224_HMAC (0x2eUL) -#define CKK_SEED (0x2fUL) -#define CKK_GOSTR3410 (0x30UL) -#define CKK_GOSTR3411 (0x31UL) -#define CKK_GOST28147 (0x32UL) -#define CKK_EC_EDWARDS (0x40UL) -#define CKK_VENDOR_DEFINED ((unsigned long) (1UL << 31)) - - -typedef unsigned long ck_certificate_type_t; - -#define CKC_X_509 (0UL) -#define CKC_X_509_ATTR_CERT (1UL) -#define CKC_WTLS (2UL) -#define CKC_VENDOR_DEFINED ((unsigned long) (1UL << 31)) - -#define CKC_OPENPGP (CKC_VENDOR_DEFINED|0x504750UL) - -typedef unsigned long ck_attribute_type_t; - -#define CKA_CLASS (0UL) -#define CKA_TOKEN (1UL) -#define CKA_PRIVATE (2UL) -#define CKA_LABEL (3UL) -#define CKA_APPLICATION (0x10UL) -#define CKA_VALUE (0x11UL) -#define CKA_OBJECT_ID (0x12UL) -#define CKA_CERTIFICATE_TYPE (0x80UL) -#define CKA_ISSUER (0x81UL) -#define CKA_SERIAL_NUMBER (0x82UL) -#define CKA_AC_ISSUER (0x83UL) -#define CKA_OWNER (0x84UL) -#define CKA_ATTR_TYPES (0x85UL) -#define CKA_TRUSTED (0x86UL) -#define CKA_CERTIFICATE_CATEGORY (0x87UL) -#define CKA_JAVA_MIDP_SECURITY_DOMAIN (0x88UL) -#define CKA_URL (0x89UL) -#define CKA_HASH_OF_SUBJECT_PUBLIC_KEY (0x8aUL) -#define CKA_HASH_OF_ISSUER_PUBLIC_KEY (0x8bUL) -#define CKA_NAME_HASH_ALGORITHM (0x8cUL) -#define CKA_CHECK_VALUE (0x90UL) -#define CKA_KEY_TYPE (0x100UL) -#define CKA_SUBJECT (0x101UL) -#define CKA_ID (0x102UL) -#define CKA_SENSITIVE (0x103UL) -#define CKA_ENCRYPT (0x104UL) -#define CKA_DECRYPT (0x105UL) -#define CKA_WRAP (0x106UL) -#define CKA_UNWRAP (0x107UL) -#define CKA_SIGN (0x108UL) -#define CKA_SIGN_RECOVER (0x109UL) -#define CKA_VERIFY (0x10aUL) -#define CKA_VERIFY_RECOVER (0x10bUL) -#define CKA_DERIVE (0x10cUL) -#define CKA_START_DATE (0x110UL) -#define CKA_END_DATE (0x111UL) -#define CKA_MODULUS (0x120UL) -#define CKA_MODULUS_BITS (0x121UL) -#define CKA_PUBLIC_EXPONENT (0x122UL) -#define CKA_PRIVATE_EXPONENT (0x123UL) -#define CKA_PRIME_1 (0x124UL) -#define CKA_PRIME_2 (0x125UL) -#define CKA_EXPONENT_1 (0x126UL) -#define CKA_EXPONENT_2 (0x127UL) -#define CKA_COEFFICIENT (0x128UL) -#define CKA_PUBLIC_KEY_INFO (0x129UL) -#define CKA_PRIME (0x130UL) -#define CKA_SUBPRIME (0x131UL) -#define CKA_BASE (0x132UL) -#define CKA_PRIME_BITS (0x133UL) -#define CKA_SUB_PRIME_BITS (0x134UL) -#define CKA_VALUE_BITS (0x160UL) -#define CKA_VALUE_LEN (0x161UL) -#define CKA_EXTRACTABLE (0x162UL) -#define CKA_LOCAL (0x163UL) -#define CKA_NEVER_EXTRACTABLE (0x164UL) -#define CKA_ALWAYS_SENSITIVE (0x165UL) -#define CKA_KEY_GEN_MECHANISM (0x166UL) -#define CKA_MODIFIABLE (0x170UL) -#define CKA_COPYABLE (0x171UL) -#define CKA_DESTROYABLE (0x172UL) -#define CKA_ECDSA_PARAMS (0x180UL) -#define CKA_EC_PARAMS (0x180UL) -#define CKA_EC_POINT (0x181UL) -#define CKA_SECONDARY_AUTH (0x200UL) -#define CKA_AUTH_PIN_FLAGS (0x201UL) -#define CKA_ALWAYS_AUTHENTICATE (0x202UL) -#define CKA_WRAP_WITH_TRUSTED (0x210UL) -#define CKA_OTP_FORMAT (0x220UL) -#define CKA_OTP_LENGTH (0x221UL) -#define CKA_OTP_TIME_INTERVAL (0x222UL) -#define CKA_OTP_USER_FRIENDLY_MODE (0x223UL) -#define CKA_OTP_CHALLENGE_REQUIREMENT (0x224UL) -#define CKA_OTP_TIME_REQUIREMENT (0x225UL) -#define CKA_OTP_COUNTER_REQUIREMENT (0x226UL) -#define CKA_OTP_PIN_REQUIREMENT (0x227UL) -#define CKA_OTP_USER_IDENTIFIER (0x22AUL) -#define CKA_OTP_SERVICE_IDENTIFIER (0x22BUL) -#define CKA_OTP_SERVICE_LOGO (0x22CUL) -#define CKA_OTP_SERVICE_LOGO_TYPE (0x22DUL) -#define CKA_OTP_COUNTER (0x22EUL) -#define CKA_OTP_TIME (0x22FUL) -#define CKA_GOSTR3410_PARAMS (0x250UL) -#define CKA_GOSTR3411_PARAMS (0x251UL) -#define CKA_GOST28147_PARAMS (0x252UL) -#define CKA_HW_FEATURE_TYPE (0x300UL) -#define CKA_RESET_ON_INIT (0x301UL) -#define CKA_HAS_RESET (0x302UL) -#define CKA_PIXEL_X (0x400UL) -#define CKA_PIXEL_Y (0x401UL) -#define CKA_RESOLUTION (0x402UL) -#define CKA_CHAR_ROWS (0x403UL) -#define CKA_CHAR_COLUMNS (0x404UL) -#define CKA_COLOR (0x405UL) -#define CKA_BITS_PER_PIXEL (0x406UL) -#define CKA_CHAR_SETS (0x480UL) -#define CKA_ENCODING_METHODS (0x481UL) -#define CKA_MIME_TYPES (0x482UL) -#define CKA_MECHANISM_TYPE (0x500UL) -#define CKA_REQUIRED_CMS_ATTRIBUTES (0x501UL) -#define CKA_DEFAULT_CMS_ATTRIBUTES (0x502UL) -#define CKA_SUPPORTED_CMS_ATTRIBUTES (0x503UL) -#define CKA_WRAP_TEMPLATE (CKF_ARRAY_ATTRIBUTE | 0x211UL) -#define CKA_UNWRAP_TEMPLATE (CKF_ARRAY_ATTRIBUTE | 0x212UL) -#define CKA_DERIVE_TEMPLATE (CKF_ARRAY_ATTRIBUTE | 0x213UL) -#define CKA_ALLOWED_MECHANISMS (CKF_ARRAY_ATTRIBUTE | 0x600UL) -#define CKA_VENDOR_DEFINED ((unsigned long) (1UL << 31)) - - -struct ck_attribute -{ - ck_attribute_type_t type; - void *value; - unsigned long value_len; -}; - - -struct ck_date -{ - unsigned char year[4]; - unsigned char month[2]; - unsigned char day[2]; -}; - - -typedef unsigned long ck_mechanism_type_t; - -#define CKM_RSA_PKCS_KEY_PAIR_GEN (0UL) -#define CKM_RSA_PKCS (1UL) -#define CKM_RSA_9796 (2UL) -#define CKM_RSA_X_509 (3UL) -#define CKM_MD2_RSA_PKCS (4UL) -#define CKM_MD5_RSA_PKCS (5UL) -#define CKM_SHA1_RSA_PKCS (6UL) -#define CKM_RIPEMD128_RSA_PKCS (7UL) -#define CKM_RIPEMD160_RSA_PKCS (8UL) -#define CKM_RSA_PKCS_OAEP (9UL) -#define CKM_RSA_X9_31_KEY_PAIR_GEN (0xaUL) -#define CKM_RSA_X9_31 (0xbUL) -#define CKM_SHA1_RSA_X9_31 (0xcUL) -#define CKM_RSA_PKCS_PSS (0xdUL) -#define CKM_SHA1_RSA_PKCS_PSS (0xeUL) -#define CKM_DSA_KEY_PAIR_GEN (0x10UL) -#define CKM_DSA (0x11UL) -#define CKM_DSA_SHA1 (0x12UL) -#define CKM_DSA_SHA224 (0x13UL) -#define CKM_DSA_SHA256 (0x14UL) -#define CKM_DSA_SHA384 (0x15UL) -#define CKM_DSA_SHA512 (0x16UL) -#define CKM_DH_PKCS_KEY_PAIR_GEN (0x20UL) -#define CKM_DH_PKCS_DERIVE (0x21UL) -#define CKM_X9_42_DH_KEY_PAIR_GEN (0x30UL) -#define CKM_X9_42_DH_DERIVE (0x31UL) -#define CKM_X9_42_DH_HYBRID_DERIVE (0x32UL) -#define CKM_X9_42_MQV_DERIVE (0x33UL) -#define CKM_SHA256_RSA_PKCS (0x40UL) -#define CKM_SHA384_RSA_PKCS (0x41UL) -#define CKM_SHA512_RSA_PKCS (0x42UL) -#define CKM_SHA256_RSA_PKCS_PSS (0x43UL) -#define CKM_SHA384_RSA_PKCS_PSS (0x44UL) -#define CKM_SHA512_RSA_PKCS_PSS (0x45UL) -#define CKM_SHA512_224 (0x48UL) -#define CKM_SHA512_224_HMAC (0x49UL) -#define CKM_SHA512_224_HMAC_GENERAL (0x4aUL) -#define CKM_SHA512_224_KEY_DERIVATION (0x4bUL) -#define CKM_SHA512_256 (0x4cUL) -#define CKM_SHA512_256_HMAC (0x4dUL) -#define CKM_SHA512_256_HMAC_GENERAL (0x4eUL) -#define CKM_SHA512_256_KEY_DERIVATION (0x4fUL) -#define CKM_SHA512_T (0x50UL) -#define CKM_SHA512_T_HMAC (0x51UL) -#define CKM_SHA512_T_HMAC_GENERAL (0x52UL) -#define CKM_SHA512_T_KEY_DERIVATION (0x53UL) -#define CKM_RC2_KEY_GEN (0x100UL) -#define CKM_RC2_ECB (0x101UL) -#define CKM_RC2_CBC (0x102UL) -#define CKM_RC2_MAC (0x103UL) -#define CKM_RC2_MAC_GENERAL (0x104UL) -#define CKM_RC2_CBC_PAD (0x105UL) -#define CKM_RC4_KEY_GEN (0x110UL) -#define CKM_RC4 (0x111UL) -#define CKM_DES_KEY_GEN (0x120UL) -#define CKM_DES_ECB (0x121UL) -#define CKM_DES_CBC (0x122UL) -#define CKM_DES_MAC (0x123UL) -#define CKM_DES_MAC_GENERAL (0x124UL) -#define CKM_DES_CBC_PAD (0x125UL) -#define CKM_DES2_KEY_GEN (0x130UL) -#define CKM_DES3_KEY_GEN (0x131UL) -#define CKM_DES3_ECB (0x132UL) -#define CKM_DES3_CBC (0x133UL) -#define CKM_DES3_MAC (0x134UL) -#define CKM_DES3_MAC_GENERAL (0x135UL) -#define CKM_DES3_CBC_PAD (0x136UL) -#define CKM_DES3_CMAC_GENERAL (0x137UL) -#define CKM_DES3_CMAC (0x138UL) -#define CKM_CDMF_KEY_GEN (0x140UL) -#define CKM_CDMF_ECB (0x141UL) -#define CKM_CDMF_CBC (0x142UL) -#define CKM_CDMF_MAC (0x143UL) -#define CKM_CDMF_MAC_GENERAL (0x144UL) -#define CKM_CDMF_CBC_PAD (0x145UL) -#define CKM_DES_OFB64 (0x150UL) -#define CKM_DES_OFB8 (0x151UL) -#define CKM_DES_CFB64 (0x152UL) -#define CKM_DES_CFB8 (0x153UL) -#define CKM_MD2 (0x200UL) -#define CKM_MD2_HMAC (0x201UL) -#define CKM_MD2_HMAC_GENERAL (0x202UL) -#define CKM_MD5 (0x210UL) -#define CKM_MD5_HMAC (0x211UL) -#define CKM_MD5_HMAC_GENERAL (0x212UL) -#define CKM_SHA_1 (0x220UL) -#define CKM_SHA_1_HMAC (0x221UL) -#define CKM_SHA_1_HMAC_GENERAL (0x222UL) -#define CKM_RIPEMD128 (0x230UL) -#define CKM_RIPEMD128_HMAC (0x231UL) -#define CKM_RIPEMD128_HMAC_GENERAL (0x232UL) -#define CKM_RIPEMD160 (0x240UL) -#define CKM_RIPEMD160_HMAC (0x241UL) -#define CKM_RIPEMD160_HMAC_GENERAL (0x242UL) -#define CKM_SHA256 (0x250UL) -#define CKM_SHA256_HMAC (0x251UL) -#define CKM_SHA256_HMAC_GENERAL (0x252UL) -#define CKM_SHA384 (0x260UL) -#define CKM_SHA384_HMAC (0x261UL) -#define CKM_SHA384_HMAC_GENERAL (0x262UL) -#define CKM_SHA512 (0x270UL) -#define CKM_SHA512_HMAC (0x271UL) -#define CKM_SHA512_HMAC_GENERAL (0x272UL) -#define CKM_SECURID_KEY_GEN (0x280UL) -#define CKM_SECURID (0x282UL) -#define CKM_HOTP_KEY_GEN (0x290UL) -#define CKM_HOTP (0x291UL) -#define CKM_ACTI (0x2a0UL) -#define CKM_ACTI_KEY_GEN (0x2a1UL) -#define CKM_CAST_KEY_GEN (0x300UL) -#define CKM_CAST_ECB (0x301UL) -#define CKM_CAST_CBC (0x302UL) -#define CKM_CAST_MAC (0x303UL) -#define CKM_CAST_MAC_GENERAL (0x304UL) -#define CKM_CAST_CBC_PAD (0x305UL) -#define CKM_CAST3_KEY_GEN (0x310UL) -#define CKM_CAST3_ECB (0x311UL) -#define CKM_CAST3_CBC (0x312UL) -#define CKM_CAST3_MAC (0x313UL) -#define CKM_CAST3_MAC_GENERAL (0x314UL) -#define CKM_CAST3_CBC_PAD (0x315UL) -#define CKM_CAST5_KEY_GEN (0x320UL) -#define CKM_CAST128_KEY_GEN (0x320UL) -#define CKM_CAST5_ECB (0x321UL) -#define CKM_CAST128_ECB (0x321UL) -#define CKM_CAST5_CBC (0x322UL) -#define CKM_CAST128_CBC (0x322UL) -#define CKM_CAST5_MAC (0x323UL) -#define CKM_CAST128_MAC (0x323UL) -#define CKM_CAST5_MAC_GENERAL (0x324UL) -#define CKM_CAST128_MAC_GENERAL (0x324UL) -#define CKM_CAST5_CBC_PAD (0x325UL) -#define CKM_CAST128_CBC_PAD (0x325UL) -#define CKM_RC5_KEY_GEN (0x330UL) -#define CKM_RC5_ECB (0x331UL) -#define CKM_RC5_CBC (0x332UL) -#define CKM_RC5_MAC (0x333UL) -#define CKM_RC5_MAC_GENERAL (0x334UL) -#define CKM_RC5_CBC_PAD (0x335UL) -#define CKM_IDEA_KEY_GEN (0x340UL) -#define CKM_IDEA_ECB (0x341UL) -#define CKM_IDEA_CBC (0x342UL) -#define CKM_IDEA_MAC (0x343UL) -#define CKM_IDEA_MAC_GENERAL (0x344UL) -#define CKM_IDEA_CBC_PAD (0x345UL) -#define CKM_GENERIC_SECRET_KEY_GEN (0x350UL) -#define CKM_CONCATENATE_BASE_AND_KEY (0x360UL) -#define CKM_CONCATENATE_BASE_AND_DATA (0x362UL) -#define CKM_CONCATENATE_DATA_AND_BASE (0x363UL) -#define CKM_XOR_BASE_AND_DATA (0x364UL) -#define CKM_EXTRACT_KEY_FROM_KEY (0x365UL) -#define CKM_SSL3_PRE_MASTER_KEY_GEN (0x370UL) -#define CKM_SSL3_MASTER_KEY_DERIVE (0x371UL) -#define CKM_SSL3_KEY_AND_MAC_DERIVE (0x372UL) -#define CKM_SSL3_MASTER_KEY_DERIVE_DH (0x373UL) -#define CKM_TLS_PRE_MASTER_KEY_GEN (0x374UL) -#define CKM_TLS_MASTER_KEY_DERIVE (0x375UL) -#define CKM_TLS_KEY_AND_MAC_DERIVE (0x376UL) -#define CKM_TLS_MASTER_KEY_DERIVE_DH (0x377UL) -#define CKM_TLS_PRF (0x378UL) -#define CKM_SSL3_MD5_MAC (0x380UL) -#define CKM_SSL3_SHA1_MAC (0x381UL) -#define CKM_MD5_KEY_DERIVATION (0x390UL) -#define CKM_MD2_KEY_DERIVATION (0x391UL) -#define CKM_SHA1_KEY_DERIVATION (0x392UL) -#define CKM_SHA256_KEY_DERIVATION (0x393UL) -#define CKM_SHA384_KEY_DERIVATION (0x394UL) -#define CKM_SHA512_KEY_DERIVATION (0x395UL) -#define CKM_PBE_MD2_DES_CBC (0x3a0UL) -#define CKM_PBE_MD5_DES_CBC (0x3a1UL) -#define CKM_PBE_MD5_CAST_CBC (0x3a2UL) -#define CKM_PBE_MD5_CAST3_CBC (0x3a3UL) -#define CKM_PBE_MD5_CAST5_CBC (0x3a4UL) -#define CKM_PBE_MD5_CAST128_CBC (0x3a4UL) -#define CKM_PBE_SHA1_CAST5_CBC (0x3a5UL) -#define CKM_PBE_SHA1_CAST128_CBC (0x3a5UL) -#define CKM_PBE_SHA1_RC4_128 (0x3a6UL) -#define CKM_PBE_SHA1_RC4_40 (0x3a7UL) -#define CKM_PBE_SHA1_DES3_EDE_CBC (0x3a8UL) -#define CKM_PBE_SHA1_DES2_EDE_CBC (0x3a9UL) -#define CKM_PBE_SHA1_RC2_128_CBC (0x3aaUL) -#define CKM_PBE_SHA1_RC2_40_CBC (0x3abUL) -#define CKM_PKCS5_PBKD2 (0x3b0UL) -#define CKM_PBA_SHA1_WITH_SHA1_HMAC (0x3c0UL) -#define CKM_WTLS_PRE_MASTER_KEY_GEN (0x3d0UL) -#define CKM_WTLS_MASTER_KEY_DERIVE (0x3d1UL) -#define CKM_WTLS_MASTER_KEY_DERIVE_DH_ECC (0x3d2UL) -#define CKM_WTLS_PRF (0x3d3UL) -#define CKM_WTLS_SERVER_KEY_AND_MAC_DERIVE (0x3d4UL) -#define CKM_WTLS_CLIENT_KEY_AND_MAC_DERIVE (0x3d5UL) -#define CKM_TLS10_MAC_SERVER (0x3d6UL) -#define CKM_TLS10_MAC_CLIENT (0x3d7UL) -#define CKM_TLS12_MAC (0x3d8UL) -#define CKM_TLS12_KDF (0x3d9UL) -#define CKM_TLS12_MASTER_KEY_DERIVE (0x3e0UL) -#define CKM_TLS12_KEY_AND_MAC_DERIVE (0x3e1UL) -#define CKM_TLS12_MASTER_KEY_DERIVE_DH (0x3e2UL) -#define CKM_TLS12_KEY_SAFE_DERIVE (0x3e3UL) -#define CKM_TLS_MAC (0x3e4UL) -#define CKM_TLS_KDF (0x3e5UL) -#define CKM_KEY_WRAP_LYNKS (0x400UL) -#define CKM_KEY_WRAP_SET_OAEP (0x401UL) -#define CKM_CMS_SIG (0x500UL) -#define CKM_KIP_DERIVE (0x510UL) -#define CKM_KIP_WRAP (0x511UL) -#define CKM_KIP_MAC (0x512UL) -#define CKM_CAMELLIA_KEY_GEN (0x550UL) -#define CKM_CAMELLIA_CTR (0x558UL) -#define CKM_ARIA_KEY_GEN (0x560UL) -#define CKM_ARIA_ECB (0x561UL) -#define CKM_ARIA_CBC (0x562UL) -#define CKM_ARIA_MAC (0x563UL) -#define CKM_ARIA_MAC_GENERAL (0x564UL) -#define CKM_ARIA_CBC_PAD (0x565UL) -#define CKM_ARIA_ECB_ENCRYPT_DATA (0x566UL) -#define CKM_ARIA_CBC_ENCRYPT_DATA (0x567UL) -#define CKM_SEED_KEY_GEN (0x650UL) -#define CKM_SEED_ECB (0x651UL) -#define CKM_SEED_CBC (0x652UL) -#define CKM_SEED_MAC (0x653UL) -#define CKM_SEED_MAC_GENERAL (0x654UL) -#define CKM_SEED_CBC_PAD (0x655UL) -#define CKM_SEED_ECB_ENCRYPT_DATA (0x656UL) -#define CKM_SEED_CBC_ENCRYPT_DATA (0x657UL) -#define CKM_SKIPJACK_KEY_GEN (0x1000UL) -#define CKM_SKIPJACK_ECB64 (0x1001UL) -#define CKM_SKIPJACK_CBC64 (0x1002UL) -#define CKM_SKIPJACK_OFB64 (0x1003UL) -#define CKM_SKIPJACK_CFB64 (0x1004UL) -#define CKM_SKIPJACK_CFB32 (0x1005UL) -#define CKM_SKIPJACK_CFB16 (0x1006UL) -#define CKM_SKIPJACK_CFB8 (0x1007UL) -#define CKM_SKIPJACK_WRAP (0x1008UL) -#define CKM_SKIPJACK_PRIVATE_WRAP (0x1009UL) -#define CKM_SKIPJACK_RELAYX (0x100aUL) -#define CKM_KEA_KEY_PAIR_GEN (0x1010UL) -#define CKM_KEA_KEY_DERIVE (0x1011UL) -#define CKM_FORTEZZA_TIMESTAMP (0x1020UL) -#define CKM_BATON_KEY_GEN (0x1030UL) -#define CKM_BATON_ECB128 (0x1031UL) -#define CKM_BATON_ECB96 (0x1032UL) -#define CKM_BATON_CBC128 (0x1033UL) -#define CKM_BATON_COUNTER (0x1034UL) -#define CKM_BATON_SHUFFLE (0x1035UL) -#define CKM_BATON_WRAP (0x1036UL) -#define CKM_ECDSA_KEY_PAIR_GEN (0x1040UL) -#define CKM_EC_KEY_PAIR_GEN (0x1040UL) -#define CKM_ECDSA (0x1041UL) -#define CKM_ECDSA_SHA1 (0x1042UL) -#define CKM_ECDSA_SHA224 (0x1043UL) -#define CKM_ECDSA_SHA256 (0x1044UL) -#define CKM_ECDSA_SHA384 (0x1045UL) -#define CKM_ECDSA_SHA512 (0x1046UL) -#define CKM_ECDH1_DERIVE (0x1050UL) -#define CKM_ECDH1_COFACTOR_DERIVE (0x1051UL) -#define CKM_ECMQV_DERIVE (0x1052UL) -#define CKM_ECDH_AES_KEY_WRAP (0x1053UL) -#define CKM_RSA_AES_KEY_WRAP (0x1054UL) -#define CKM_JUNIPER_KEY_GEN (0x1060UL) -#define CKM_JUNIPER_ECB128 (0x1061UL) -#define CKM_JUNIPER_CBC128 (0x1062UL) -#define CKM_JUNIPER_COUNTER (0x1063UL) -#define CKM_JUNIPER_SHUFFLE (0x1064UL) -#define CKM_JUNIPER_WRAP (0x1065UL) -#define CKM_FASTHASH (0x1070UL) -#define CKM_AES_KEY_GEN (0x1080UL) -#define CKM_AES_ECB (0x1081UL) -#define CKM_AES_CBC (0x1082UL) -#define CKM_AES_MAC (0x1083UL) -#define CKM_AES_MAC_GENERAL (0x1084UL) -#define CKM_AES_CBC_PAD (0x1085UL) -#define CKM_AES_CTR (0x1086UL) -#define CKM_AES_GCM (0x1087UL) -#define CKM_AES_CCM (0x1088UL) -#define CKM_AES_CTS (0x1089UL) -#define CKM_AES_CMAC (0x108aUL) -#define CKM_AES_CMAC_GENERAL (0x108bUL) -#define CKM_AES_XCBC_MAC (0x108cUL) -#define CKM_AES_XCBC_MAC_96 (0x108dUL) -#define CKM_AES_GMAC (0x108eUL) -#define CKM_BLOWFISH_KEY_GEN (0x1090UL) -#define CKM_BLOWFISH_CBC (0x1091UL) -#define CKM_TWOFISH_KEY_GEN (0x1092UL) -#define CKM_TWOFISH_CBC (0x1093UL) -#define CKM_BLOWFISH_CBC_PAD (0x1094UL) -#define CKM_TWOFISH_CBC_PAD (0x1095UL) -#define CKM_DES_ECB_ENCRYPT_DATA (0x1100UL) -#define CKM_DES_CBC_ENCRYPT_DATA (0x1101UL) -#define CKM_DES3_ECB_ENCRYPT_DATA (0x1102UL) -#define CKM_DES3_CBC_ENCRYPT_DATA (0x1103UL) -#define CKM_AES_ECB_ENCRYPT_DATA (0x1104UL) -#define CKM_AES_CBC_ENCRYPT_DATA (0x1105UL) -#define CKM_GOSTR3410_KEY_PAIR_GEN (0x1200UL) -#define CKM_GOSTR3410 (0x1201UL) -#define CKM_GOSTR3410_WITH_GOSTR3411 (0x1202UL) -#define CKM_GOSTR3410_KEY_WRAP (0x1203UL) -#define CKM_GOSTR3410_DERIVE (0x1204UL) -#define CKM_GOSTR3411 (0x1210UL) -#define CKM_GOSTR3411_HMAC (0x1211UL) -#define CKM_GOST28147_KEY_GEN (0x1220UL) -#define CKM_GOST28147_ECB (0x1221UL) -#define CKM_GOST28147 (0x1222UL) -#define CKM_GOST28147_MAC (0x1223UL) -#define CKM_GOST28147_KEY_WRAP (0x1224UL) -#define CKM_DSA_PARAMETER_GEN (0x2000UL) -#define CKM_DH_PKCS_PARAMETER_GEN (0x2001UL) -#define CKM_X9_42_DH_PARAMETER_GEN (0x2002UL) -#define CKM_DSA_PROBABLISTIC_PARAMETER_GEN (0x2003UL) -#define CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN (0x2004UL) -#define CKM_AES_OFB (0x2104UL) -#define CKM_AES_CFB64 (0x2105UL) -#define CKM_AES_CFB8 (0x2106UL) -#define CKM_AES_CFB128 (0x2107UL) -#define CKM_AES_CFB1 (0x2108UL) - -#define CKM_VENDOR_DEFINED ((unsigned long) (1UL << 31)) - -/* Amendments */ -#define CKM_SHA224 (0x255UL) -#define CKM_SHA224_HMAC (0x256UL) -#define CKM_SHA224_HMAC_GENERAL (0x257UL) -#define CKM_SHA224_RSA_PKCS (0x46UL) -#define CKM_SHA224_RSA_PKCS_PSS (0x47UL) -#define CKM_SHA224_KEY_DERIVATION (0x396UL) - -#define CKM_CAMELLIA_KEY_GEN (0x550UL) -#define CKM_CAMELLIA_ECB (0x551UL) -#define CKM_CAMELLIA_CBC (0x552UL) -#define CKM_CAMELLIA_MAC (0x553UL) -#define CKM_CAMELLIA_MAC_GENERAL (0x554UL) -#define CKM_CAMELLIA_CBC_PAD (0x555UL) -#define CKM_CAMELLIA_ECB_ENCRYPT_DATA (0x556UL) -#define CKM_CAMELLIA_CBC_ENCRYPT_DATA (0x557UL) - -#define CKM_AES_KEY_WRAP (0x2109UL) -#define CKM_AES_KEY_WRAP_PAD (0x210aUL) - -#define CKM_RSA_PKCS_TPM_1_1 (0x4001UL) -#define CKM_RSA_PKCS_OAEP_TPM_1_1 (0x4002UL) - -/* From version 3.0 */ -#define CKM_EC_EDWARDS_KEY_PAIR_GEN (0x1055UL) -#define CKM_EC_MONTGOMERY_KEY_PAIR_GEN (0x1056UL) -#define CKM_EDDSA (0x1057UL) - -/* Attribute and other constants related to OTP */ -#define CK_OTP_FORMAT_DECIMAL (0UL) -#define CK_OTP_FORMAT_HEXADECIMAL (1UL) -#define CK_OTP_FORMAT_ALPHANUMERIC (2UL) -#define CK_OTP_FORMAT_BINARY (3UL) -#define CK_OTP_PARAM_IGNORED (0UL) -#define CK_OTP_PARAM_OPTIONAL (1UL) -#define CK_OTP_PARAM_MANDATORY (2UL) - -#define CK_OTP_VALUE (0UL) -#define CK_OTP_PIN (1UL) -#define CK_OTP_CHALLENGE (2UL) -#define CK_OTP_TIME (3UL) -#define CK_OTP_COUNTER (4UL) -#define CK_OTP_FLAGS (5UL) -#define CK_OTP_OUTPUT_LENGTH (6UL) -#define CK_OTP_FORMAT (7UL) - -/* OTP mechanism flags */ -#define CKF_NEXT_OTP (0x01UL) -#define CKF_EXCLUDE_TIME (0x02UL) -#define CKF_EXCLUDE_COUNTER (0x04UL) -#define CKF_EXCLUDE_CHALLENGE (0x08UL) -#define CKF_EXCLUDE_PIN (0x10UL) -#define CKF_USER_FRIENDLY_OTP (0x20UL) - -#define CKN_OTP_CHANGED (0x01UL) - -struct ck_mechanism -{ - ck_mechanism_type_t mechanism; - void *parameter; - unsigned long parameter_len; -}; - - -struct ck_mechanism_info -{ - unsigned long min_key_size; - unsigned long max_key_size; - ck_flags_t flags; -}; - -typedef unsigned long ck_param_type; - -typedef struct ck_otp_param { - ck_param_type type; - void *value; - unsigned long value_len; -} ck_otp_param; - -typedef struct ck_otp_params { - struct ck_otp_param *params; - unsigned long count; -} ck_otp_params; - -typedef struct ck_otp_signature_info -{ - struct ck_otp_param *params; - unsigned long count; -} ck_otp_signature_info; - -#define CKG_MGF1_SHA1 0x00000001UL -#define CKG_MGF1_SHA224 0x00000005UL -#define CKG_MGF1_SHA256 0x00000002UL -#define CKG_MGF1_SHA384 0x00000003UL -#define CKG_MGF1_SHA512 0x00000004UL - -typedef unsigned long ck_rsa_pkcs_mgf_type_t; - -struct ck_rsa_pkcs_pss_params { - ck_mechanism_type_t hash_alg; - ck_rsa_pkcs_mgf_type_t mgf; - unsigned long s_len; -}; - -typedef unsigned long ck_rsa_pkcs_oaep_source_type_t; - -struct ck_rsa_pkcs_oaep_params { - ck_mechanism_type_t hash_alg; - ck_rsa_pkcs_mgf_type_t mgf; - ck_rsa_pkcs_oaep_source_type_t source; - void *source_data; - unsigned long source_data_len; -}; - -struct ck_aes_ctr_params { - unsigned long counter_bits; - unsigned char cb[16]; -}; - -struct ck_gcm_params { - unsigned char *iv_ptr; - unsigned long iv_len; - unsigned long iv_bits; - unsigned char *aad_ptr; - unsigned long aad_len; - unsigned long tag_bits; -}; - - -/* The following EC Key Derivation Functions are defined */ -#define CKD_NULL (0x01UL) -#define CKD_SHA1_KDF (0x02UL) - -/* The following X9.42 DH key derivation functions are defined */ -#define CKD_SHA1_KDF_ASN1 (0x03UL) -#define CKD_SHA1_KDF_CONCATENATE (0x04UL) -#define CKD_SHA224_KDF (0x05UL) -#define CKD_SHA256_KDF (0x06UL) -#define CKD_SHA384_KDF (0x07UL) -#define CKD_SHA512_KDF (0x08UL) -#define CKD_CPDIVERSIFY_KDF (0x09UL) - -typedef unsigned long ck_ec_kdf_t; - -struct ck_ecdh1_derive_params { - ck_ec_kdf_t kdf; - unsigned long shared_data_len; - unsigned char *shared_data; - unsigned long public_data_len; - unsigned char *public_data; -}; - -struct ck_key_derivation_string_data { - unsigned char *string_data; - unsigned long string_data_len; -}; - -struct ck_des_cbc_encrypt_data_params { - unsigned char iv[8]; - unsigned char *data_params; - unsigned long length; -}; - -struct ck_aes_cbc_encrypt_data_params { - unsigned char iv[16]; - unsigned char *data_params; - unsigned long length; -}; - -#define CKF_HW (1UL << 0) -#define CKF_ENCRYPT (1UL << 8) -#define CKF_DECRYPT (1UL << 9) -#define CKF_DIGEST (1UL << 10) -#define CKF_SIGN (1UL << 11) -#define CKF_SIGN_RECOVER (1UL << 12) -#define CKF_VERIFY (1UL << 13) -#define CKF_VERIFY_RECOVER (1UL << 14) -#define CKF_GENERATE (1UL << 15) -#define CKF_GENERATE_KEY_PAIR (1UL << 16) -#define CKF_WRAP (1UL << 17) -#define CKF_UNWRAP (1UL << 18) -#define CKF_DERIVE (1UL << 19) -#define CKF_EXTENSION ((unsigned long) (1UL << 31)) - -#define CKF_EC_F_P (1UL << 20) -#define CKF_EC_F_2M (1UL << 21) -#define CKF_EC_ECPARAMETERS (1UL << 22) -#define CKF_EC_NAMEDCURVE (1UL << 23) -#define CKF_EC_UNCOMPRESS (1UL << 24) -#define CKF_EC_COMPRESS (1UL << 25) - - -/* Flags for C_WaitForSlotEvent. */ -#define CKF_DONT_BLOCK (1UL) - - -typedef unsigned long ck_rv_t; - - -typedef ck_rv_t (*ck_notify_t) (ck_session_handle_t session, - ck_notification_t event, void *application); - -/* Forward reference. */ -struct ck_function_list; - -#define _CK_DECLARE_FUNCTION(name, args) \ -typedef ck_rv_t (*CK_ ## name) args; \ -ck_rv_t CK_SPEC name args - -_CK_DECLARE_FUNCTION (C_Initialize, (void *init_args)); -_CK_DECLARE_FUNCTION (C_Finalize, (void *reserved)); -_CK_DECLARE_FUNCTION (C_GetInfo, (struct ck_info *info)); -_CK_DECLARE_FUNCTION (C_GetFunctionList, - (struct ck_function_list **function_list)); - -_CK_DECLARE_FUNCTION (C_GetSlotList, - (unsigned char token_present, ck_slot_id_t *slot_list, - unsigned long *count)); -_CK_DECLARE_FUNCTION (C_GetSlotInfo, - (ck_slot_id_t slot_id, struct ck_slot_info *info)); -_CK_DECLARE_FUNCTION (C_GetTokenInfo, - (ck_slot_id_t slot_id, struct ck_token_info *info)); -_CK_DECLARE_FUNCTION (C_WaitForSlotEvent, - (ck_flags_t flags, ck_slot_id_t *slot, void *reserved)); -_CK_DECLARE_FUNCTION (C_GetMechanismList, - (ck_slot_id_t slot_id, - ck_mechanism_type_t *mechanism_list, - unsigned long *count)); -_CK_DECLARE_FUNCTION (C_GetMechanismInfo, - (ck_slot_id_t slot_id, ck_mechanism_type_t type, - struct ck_mechanism_info *info)); -_CK_DECLARE_FUNCTION (C_InitToken, - (ck_slot_id_t slot_id, unsigned char *pin, - unsigned long pin_len, unsigned char *label)); -_CK_DECLARE_FUNCTION (C_InitPIN, - (ck_session_handle_t session, unsigned char *pin, - unsigned long pin_len)); -_CK_DECLARE_FUNCTION (C_SetPIN, - (ck_session_handle_t session, unsigned char *old_pin, - unsigned long old_len, unsigned char *new_pin, - unsigned long new_len)); - -_CK_DECLARE_FUNCTION (C_OpenSession, - (ck_slot_id_t slot_id, ck_flags_t flags, - void *application, ck_notify_t notify, - ck_session_handle_t *session)); -_CK_DECLARE_FUNCTION (C_CloseSession, (ck_session_handle_t session)); -_CK_DECLARE_FUNCTION (C_CloseAllSessions, (ck_slot_id_t slot_id)); -_CK_DECLARE_FUNCTION (C_GetSessionInfo, - (ck_session_handle_t session, - struct ck_session_info *info)); -_CK_DECLARE_FUNCTION (C_GetOperationState, - (ck_session_handle_t session, - unsigned char *operation_state, - unsigned long *operation_state_len)); -_CK_DECLARE_FUNCTION (C_SetOperationState, - (ck_session_handle_t session, - unsigned char *operation_state, - unsigned long operation_state_len, - ck_object_handle_t encryption_key, - ck_object_handle_t authentiation_key)); -_CK_DECLARE_FUNCTION (C_Login, - (ck_session_handle_t session, ck_user_type_t user_type, - unsigned char *pin, unsigned long pin_len)); -_CK_DECLARE_FUNCTION (C_Logout, (ck_session_handle_t session)); - -_CK_DECLARE_FUNCTION (C_CreateObject, - (ck_session_handle_t session, - struct ck_attribute *templ, - unsigned long count, ck_object_handle_t *object)); -_CK_DECLARE_FUNCTION (C_CopyObject, - (ck_session_handle_t session, ck_object_handle_t object, - struct ck_attribute *templ, unsigned long count, - ck_object_handle_t *new_object)); -_CK_DECLARE_FUNCTION (C_DestroyObject, - (ck_session_handle_t session, - ck_object_handle_t object)); -_CK_DECLARE_FUNCTION (C_GetObjectSize, - (ck_session_handle_t session, - ck_object_handle_t object, - unsigned long *size)); -_CK_DECLARE_FUNCTION (C_GetAttributeValue, - (ck_session_handle_t session, - ck_object_handle_t object, - struct ck_attribute *templ, - unsigned long count)); -_CK_DECLARE_FUNCTION (C_SetAttributeValue, - (ck_session_handle_t session, - ck_object_handle_t object, - struct ck_attribute *templ, - unsigned long count)); -_CK_DECLARE_FUNCTION (C_FindObjectsInit, - (ck_session_handle_t session, - struct ck_attribute *templ, - unsigned long count)); -_CK_DECLARE_FUNCTION (C_FindObjects, - (ck_session_handle_t session, - ck_object_handle_t *object, - unsigned long max_object_count, - unsigned long *object_count)); -_CK_DECLARE_FUNCTION (C_FindObjectsFinal, - (ck_session_handle_t session)); - -_CK_DECLARE_FUNCTION (C_EncryptInit, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - ck_object_handle_t key)); -_CK_DECLARE_FUNCTION (C_Encrypt, - (ck_session_handle_t session, - unsigned char *data, unsigned long data_len, - unsigned char *encrypted_data, - unsigned long *encrypted_data_len)); -_CK_DECLARE_FUNCTION (C_EncryptUpdate, - (ck_session_handle_t session, - unsigned char *part, unsigned long part_len, - unsigned char *encrypted_part, - unsigned long *encrypted_part_len)); -_CK_DECLARE_FUNCTION (C_EncryptFinal, - (ck_session_handle_t session, - unsigned char *last_encrypted_part, - unsigned long *last_encrypted_part_len)); - -_CK_DECLARE_FUNCTION (C_DecryptInit, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - ck_object_handle_t key)); -_CK_DECLARE_FUNCTION (C_Decrypt, - (ck_session_handle_t session, - unsigned char *encrypted_data, - unsigned long encrypted_data_len, - unsigned char *data, unsigned long *data_len)); -_CK_DECLARE_FUNCTION (C_DecryptUpdate, - (ck_session_handle_t session, - unsigned char *encrypted_part, - unsigned long encrypted_part_len, - unsigned char *part, unsigned long *part_len)); -_CK_DECLARE_FUNCTION (C_DecryptFinal, - (ck_session_handle_t session, - unsigned char *last_part, - unsigned long *last_part_len)); - -_CK_DECLARE_FUNCTION (C_DigestInit, - (ck_session_handle_t session, - struct ck_mechanism *mechanism)); -_CK_DECLARE_FUNCTION (C_Digest, - (ck_session_handle_t session, - unsigned char *data, unsigned long data_len, - unsigned char *digest, - unsigned long *digest_len)); -_CK_DECLARE_FUNCTION (C_DigestUpdate, - (ck_session_handle_t session, - unsigned char *part, unsigned long part_len)); -_CK_DECLARE_FUNCTION (C_DigestKey, - (ck_session_handle_t session, ck_object_handle_t key)); -_CK_DECLARE_FUNCTION (C_DigestFinal, - (ck_session_handle_t session, - unsigned char *digest, - unsigned long *digest_len)); - -_CK_DECLARE_FUNCTION (C_SignInit, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - ck_object_handle_t key)); -_CK_DECLARE_FUNCTION (C_Sign, - (ck_session_handle_t session, - unsigned char *data, unsigned long data_len, - unsigned char *signature, - unsigned long *signature_len)); -_CK_DECLARE_FUNCTION (C_SignUpdate, - (ck_session_handle_t session, - unsigned char *part, unsigned long part_len)); -_CK_DECLARE_FUNCTION (C_SignFinal, - (ck_session_handle_t session, - unsigned char *signature, - unsigned long *signature_len)); -_CK_DECLARE_FUNCTION (C_SignRecoverInit, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - ck_object_handle_t key)); -_CK_DECLARE_FUNCTION (C_SignRecover, - (ck_session_handle_t session, - unsigned char *data, unsigned long data_len, - unsigned char *signature, - unsigned long *signature_len)); - -_CK_DECLARE_FUNCTION (C_VerifyInit, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - ck_object_handle_t key)); -_CK_DECLARE_FUNCTION (C_Verify, - (ck_session_handle_t session, - unsigned char *data, unsigned long data_len, - unsigned char *signature, - unsigned long signature_len)); -_CK_DECLARE_FUNCTION (C_VerifyUpdate, - (ck_session_handle_t session, - unsigned char *part, unsigned long part_len)); -_CK_DECLARE_FUNCTION (C_VerifyFinal, - (ck_session_handle_t session, - unsigned char *signature, - unsigned long signature_len)); -_CK_DECLARE_FUNCTION (C_VerifyRecoverInit, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - ck_object_handle_t key)); -_CK_DECLARE_FUNCTION (C_VerifyRecover, - (ck_session_handle_t session, - unsigned char *signature, - unsigned long signature_len, - unsigned char *data, - unsigned long *data_len)); - -_CK_DECLARE_FUNCTION (C_DigestEncryptUpdate, - (ck_session_handle_t session, - unsigned char *part, unsigned long part_len, - unsigned char *encrypted_part, - unsigned long *encrypted_part_len)); -_CK_DECLARE_FUNCTION (C_DecryptDigestUpdate, - (ck_session_handle_t session, - unsigned char *encrypted_part, - unsigned long encrypted_part_len, - unsigned char *part, - unsigned long *part_len)); -_CK_DECLARE_FUNCTION (C_SignEncryptUpdate, - (ck_session_handle_t session, - unsigned char *part, unsigned long part_len, - unsigned char *encrypted_part, - unsigned long *encrypted_part_len)); -_CK_DECLARE_FUNCTION (C_DecryptVerifyUpdate, - (ck_session_handle_t session, - unsigned char *encrypted_part, - unsigned long encrypted_part_len, - unsigned char *part, - unsigned long *part_len)); - -_CK_DECLARE_FUNCTION (C_GenerateKey, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - struct ck_attribute *templ, - unsigned long count, - ck_object_handle_t *key)); -_CK_DECLARE_FUNCTION (C_GenerateKeyPair, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - struct ck_attribute *public_key_template, - unsigned long public_key_attribute_count, - struct ck_attribute *private_key_template, - unsigned long private_key_attribute_count, - ck_object_handle_t *public_key, - ck_object_handle_t *private_key)); -_CK_DECLARE_FUNCTION (C_WrapKey, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - ck_object_handle_t wrapping_key, - ck_object_handle_t key, - unsigned char *wrapped_key, - unsigned long *wrapped_key_len)); -_CK_DECLARE_FUNCTION (C_UnwrapKey, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - ck_object_handle_t unwrapping_key, - unsigned char *wrapped_key, - unsigned long wrapped_key_len, - struct ck_attribute *templ, - unsigned long attribute_count, - ck_object_handle_t *key)); -_CK_DECLARE_FUNCTION (C_DeriveKey, - (ck_session_handle_t session, - struct ck_mechanism *mechanism, - ck_object_handle_t base_key, - struct ck_attribute *templ, - unsigned long attribute_count, - ck_object_handle_t *key)); - -_CK_DECLARE_FUNCTION (C_SeedRandom, - (ck_session_handle_t session, unsigned char *seed, - unsigned long seed_len)); -_CK_DECLARE_FUNCTION (C_GenerateRandom, - (ck_session_handle_t session, - unsigned char *random_data, - unsigned long random_len)); - -_CK_DECLARE_FUNCTION (C_GetFunctionStatus, (ck_session_handle_t session)); -_CK_DECLARE_FUNCTION (C_CancelFunction, (ck_session_handle_t session)); - - -struct ck_function_list -{ - struct ck_version version; - CK_C_Initialize C_Initialize; - CK_C_Finalize C_Finalize; - CK_C_GetInfo C_GetInfo; - CK_C_GetFunctionList C_GetFunctionList; - CK_C_GetSlotList C_GetSlotList; - CK_C_GetSlotInfo C_GetSlotInfo; - CK_C_GetTokenInfo C_GetTokenInfo; - CK_C_GetMechanismList C_GetMechanismList; - CK_C_GetMechanismInfo C_GetMechanismInfo; - CK_C_InitToken C_InitToken; - CK_C_InitPIN C_InitPIN; - CK_C_SetPIN C_SetPIN; - CK_C_OpenSession C_OpenSession; - CK_C_CloseSession C_CloseSession; - CK_C_CloseAllSessions C_CloseAllSessions; - CK_C_GetSessionInfo C_GetSessionInfo; - CK_C_GetOperationState C_GetOperationState; - CK_C_SetOperationState C_SetOperationState; - CK_C_Login C_Login; - CK_C_Logout C_Logout; - CK_C_CreateObject C_CreateObject; - CK_C_CopyObject C_CopyObject; - CK_C_DestroyObject C_DestroyObject; - CK_C_GetObjectSize C_GetObjectSize; - CK_C_GetAttributeValue C_GetAttributeValue; - CK_C_SetAttributeValue C_SetAttributeValue; - CK_C_FindObjectsInit C_FindObjectsInit; - CK_C_FindObjects C_FindObjects; - CK_C_FindObjectsFinal C_FindObjectsFinal; - CK_C_EncryptInit C_EncryptInit; - CK_C_Encrypt C_Encrypt; - CK_C_EncryptUpdate C_EncryptUpdate; - CK_C_EncryptFinal C_EncryptFinal; - CK_C_DecryptInit C_DecryptInit; - CK_C_Decrypt C_Decrypt; - CK_C_DecryptUpdate C_DecryptUpdate; - CK_C_DecryptFinal C_DecryptFinal; - CK_C_DigestInit C_DigestInit; - CK_C_Digest C_Digest; - CK_C_DigestUpdate C_DigestUpdate; - CK_C_DigestKey C_DigestKey; - CK_C_DigestFinal C_DigestFinal; - CK_C_SignInit C_SignInit; - CK_C_Sign C_Sign; - CK_C_SignUpdate C_SignUpdate; - CK_C_SignFinal C_SignFinal; - CK_C_SignRecoverInit C_SignRecoverInit; - CK_C_SignRecover C_SignRecover; - CK_C_VerifyInit C_VerifyInit; - CK_C_Verify C_Verify; - CK_C_VerifyUpdate C_VerifyUpdate; - CK_C_VerifyFinal C_VerifyFinal; - CK_C_VerifyRecoverInit C_VerifyRecoverInit; - CK_C_VerifyRecover C_VerifyRecover; - CK_C_DigestEncryptUpdate C_DigestEncryptUpdate; - CK_C_DecryptDigestUpdate C_DecryptDigestUpdate; - CK_C_SignEncryptUpdate C_SignEncryptUpdate; - CK_C_DecryptVerifyUpdate C_DecryptVerifyUpdate; - CK_C_GenerateKey C_GenerateKey; - CK_C_GenerateKeyPair C_GenerateKeyPair; - CK_C_WrapKey C_WrapKey; - CK_C_UnwrapKey C_UnwrapKey; - CK_C_DeriveKey C_DeriveKey; - CK_C_SeedRandom C_SeedRandom; - CK_C_GenerateRandom C_GenerateRandom; - CK_C_GetFunctionStatus C_GetFunctionStatus; - CK_C_CancelFunction C_CancelFunction; - CK_C_WaitForSlotEvent C_WaitForSlotEvent; -}; - - -typedef ck_rv_t (*ck_createmutex_t) (void **mutex); -typedef ck_rv_t (*ck_destroymutex_t) (void *mutex); -typedef ck_rv_t (*ck_lockmutex_t) (void *mutex); -typedef ck_rv_t (*ck_unlockmutex_t) (void *mutex); - - -struct ck_c_initialize_args -{ - ck_createmutex_t create_mutex; - ck_destroymutex_t destroy_mutex; - ck_lockmutex_t lock_mutex; - ck_unlockmutex_t unlock_mutex; - ck_flags_t flags; - void *reserved; -}; - - -#define CKF_LIBRARY_CANT_CREATE_OS_THREADS (1UL << 0) -#define CKF_OS_LOCKING_OK (1UL << 1) - -#define CKR_OK (0UL) -#define CKR_CANCEL (1UL) -#define CKR_HOST_MEMORY (2UL) -#define CKR_SLOT_ID_INVALID (3UL) -#define CKR_GENERAL_ERROR (5UL) -#define CKR_FUNCTION_FAILED (6UL) -#define CKR_ARGUMENTS_BAD (7UL) -#define CKR_NO_EVENT (8UL) -#define CKR_NEED_TO_CREATE_THREADS (9UL) -#define CKR_CANT_LOCK (0xaUL) -#define CKR_ATTRIBUTE_READ_ONLY (0x10UL) -#define CKR_ATTRIBUTE_SENSITIVE (0x11UL) -#define CKR_ATTRIBUTE_TYPE_INVALID (0x12UL) -#define CKR_ATTRIBUTE_VALUE_INVALID (0x13UL) -#define CKR_ACTION_PROHIBITED (0x1BUL) -#define CKR_DATA_INVALID (0x20UL) -#define CKR_DATA_LEN_RANGE (0x21UL) -#define CKR_DEVICE_ERROR (0x30UL) -#define CKR_DEVICE_MEMORY (0x31UL) -#define CKR_DEVICE_REMOVED (0x32UL) -#define CKR_ENCRYPTED_DATA_INVALID (0x40UL) -#define CKR_ENCRYPTED_DATA_LEN_RANGE (0x41UL) -#define CKR_FUNCTION_CANCELED (0x50UL) -#define CKR_FUNCTION_NOT_PARALLEL (0x51UL) -#define CKR_FUNCTION_NOT_SUPPORTED (0x54UL) -#define CKR_KEY_HANDLE_INVALID (0x60UL) -#define CKR_KEY_SIZE_RANGE (0x62UL) -#define CKR_KEY_TYPE_INCONSISTENT (0x63UL) -#define CKR_KEY_NOT_NEEDED (0x64UL) -#define CKR_KEY_CHANGED (0x65UL) -#define CKR_KEY_NEEDED (0x66UL) -#define CKR_KEY_INDIGESTIBLE (0x67UL) -#define CKR_KEY_FUNCTION_NOT_PERMITTED (0x68UL) -#define CKR_KEY_NOT_WRAPPABLE (0x69UL) -#define CKR_KEY_UNEXTRACTABLE (0x6aUL) -#define CKR_MECHANISM_INVALID (0x70UL) -#define CKR_MECHANISM_PARAM_INVALID (0x71UL) -#define CKR_OBJECT_HANDLE_INVALID (0x82UL) -#define CKR_OPERATION_ACTIVE (0x90UL) -#define CKR_OPERATION_NOT_INITIALIZED (0x91UL) -#define CKR_PIN_INCORRECT (0xa0UL) -#define CKR_PIN_INVALID (0xa1UL) -#define CKR_PIN_LEN_RANGE (0xa2UL) -#define CKR_PIN_EXPIRED (0xa3UL) -#define CKR_PIN_LOCKED (0xa4UL) -#define CKR_SESSION_CLOSED (0xb0UL) -#define CKR_SESSION_COUNT (0xb1UL) -#define CKR_SESSION_HANDLE_INVALID (0xb3UL) -#define CKR_SESSION_PARALLEL_NOT_SUPPORTED (0xb4UL) -#define CKR_SESSION_READ_ONLY (0xb5UL) -#define CKR_SESSION_EXISTS (0xb6UL) -#define CKR_SESSION_READ_ONLY_EXISTS (0xb7UL) -#define CKR_SESSION_READ_WRITE_SO_EXISTS (0xb8UL) -#define CKR_SIGNATURE_INVALID (0xc0UL) -#define CKR_SIGNATURE_LEN_RANGE (0xc1UL) -#define CKR_TEMPLATE_INCOMPLETE (0xd0UL) -#define CKR_TEMPLATE_INCONSISTENT (0xd1UL) -#define CKR_TOKEN_NOT_PRESENT (0xe0UL) -#define CKR_TOKEN_NOT_RECOGNIZED (0xe1UL) -#define CKR_TOKEN_WRITE_PROTECTED (0xe2UL) -#define CKR_UNWRAPPING_KEY_HANDLE_INVALID (0xf0UL) -#define CKR_UNWRAPPING_KEY_SIZE_RANGE (0xf1UL) -#define CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT (0xf2UL) -#define CKR_USER_ALREADY_LOGGED_IN (0x100UL) -#define CKR_USER_NOT_LOGGED_IN (0x101UL) -#define CKR_USER_PIN_NOT_INITIALIZED (0x102UL) -#define CKR_USER_TYPE_INVALID (0x103UL) -#define CKR_USER_ANOTHER_ALREADY_LOGGED_IN (0x104UL) -#define CKR_USER_TOO_MANY_TYPES (0x105UL) -#define CKR_WRAPPED_KEY_INVALID (0x110UL) -#define CKR_WRAPPED_KEY_LEN_RANGE (0x112UL) -#define CKR_WRAPPING_KEY_HANDLE_INVALID (0x113UL) -#define CKR_WRAPPING_KEY_SIZE_RANGE (0x114UL) -#define CKR_WRAPPING_KEY_TYPE_INCONSISTENT (0x115UL) -#define CKR_RANDOM_SEED_NOT_SUPPORTED (0x120UL) -#define CKR_RANDOM_NO_RNG (0x121UL) -#define CKR_DOMAIN_PARAMS_INVALID (0x130UL) -#define CKR_BUFFER_TOO_SMALL (0x150UL) -#define CKR_SAVED_STATE_INVALID (0x160UL) -#define CKR_INFORMATION_SENSITIVE (0x170UL) -#define CKR_STATE_UNSAVEABLE (0x180UL) -#define CKR_CRYPTOKI_NOT_INITIALIZED (0x190UL) -#define CKR_CRYPTOKI_ALREADY_INITIALIZED (0x191UL) -#define CKR_MUTEX_BAD (0x1a0UL) -#define CKR_MUTEX_NOT_LOCKED (0x1a1UL) -#define CKR_NEW_PIN_MODE (0x1b0UL) -#define CKR_NEXT_OTP (0x1b1UL) -#define CKR_EXCEEDED_MAX_ITERATIONS (0x1c0UL) -#define CKR_FIPS_SELF_TEST_FAILED (0x1c1UL) -#define CKR_LIBRARY_LOAD_FAILED (0x1c2UL) -#define CKR_PIN_TOO_WEAK (0x1c3UL) -#define CKR_PUBLIC_KEY_INVALID (0x1c4UL) -#define CKR_FUNCTION_REJECTED (0x200UL) -#define CKR_VENDOR_DEFINED ((unsigned long) (1UL << 31)) - - -#define CKZ_DATA_SPECIFIED (0x01UL) - - - -/* Compatibility layer. */ - -#ifdef CRYPTOKI_COMPAT - -#undef CK_DEFINE_FUNCTION -#define CK_DEFINE_FUNCTION(retval, name) retval CK_SPEC name - -/* For NULL. */ -#include - -typedef unsigned char CK_BYTE; -typedef unsigned char CK_CHAR; -typedef unsigned char CK_UTF8CHAR; -typedef unsigned char CK_BBOOL; -typedef unsigned long int CK_ULONG; -typedef long int CK_LONG; -typedef CK_BYTE *CK_BYTE_PTR; -typedef CK_CHAR *CK_CHAR_PTR; -typedef CK_UTF8CHAR *CK_UTF8CHAR_PTR; -typedef CK_ULONG *CK_ULONG_PTR; -typedef void *CK_VOID_PTR; -typedef void **CK_VOID_PTR_PTR; -#define CK_FALSE 0 -#define CK_TRUE 1 -#ifndef CK_DISABLE_TRUE_FALSE -#ifndef FALSE -#define FALSE 0 -#endif -#ifndef TRUE -#define TRUE 1 -#endif -#endif - -typedef struct ck_version CK_VERSION; -typedef struct ck_version *CK_VERSION_PTR; - -typedef struct ck_info CK_INFO; -typedef struct ck_info *CK_INFO_PTR; - -typedef ck_slot_id_t *CK_SLOT_ID_PTR; - -typedef struct ck_slot_info CK_SLOT_INFO; -typedef struct ck_slot_info *CK_SLOT_INFO_PTR; - -typedef struct ck_token_info CK_TOKEN_INFO; -typedef struct ck_token_info *CK_TOKEN_INFO_PTR; - -typedef ck_session_handle_t *CK_SESSION_HANDLE_PTR; - -typedef struct ck_session_info CK_SESSION_INFO; -typedef struct ck_session_info *CK_SESSION_INFO_PTR; - -typedef ck_object_handle_t *CK_OBJECT_HANDLE_PTR; - -typedef ck_object_class_t *CK_OBJECT_CLASS_PTR; - -typedef struct ck_attribute CK_ATTRIBUTE; -typedef struct ck_attribute *CK_ATTRIBUTE_PTR; - -typedef struct ck_date CK_DATE; -typedef struct ck_date *CK_DATE_PTR; - -typedef ck_mechanism_type_t *CK_MECHANISM_TYPE_PTR; - -typedef struct ck_mechanism CK_MECHANISM; -typedef struct ck_mechanism *CK_MECHANISM_PTR; - -typedef struct ck_mechanism_info CK_MECHANISM_INFO; -typedef struct ck_mechanism_info *CK_MECHANISM_INFO_PTR; - -typedef struct ck_otp_mechanism_info CK_OTP_MECHANISM_INFO; -typedef struct ck_otp_mechanism_info *CK_OTP_MECHANISM_INFO_PTR; - -typedef struct ck_function_list CK_FUNCTION_LIST; -typedef struct ck_function_list *CK_FUNCTION_LIST_PTR; -typedef struct ck_function_list **CK_FUNCTION_LIST_PTR_PTR; - -typedef struct ck_c_initialize_args CK_C_INITIALIZE_ARGS; -typedef struct ck_c_initialize_args *CK_C_INITIALIZE_ARGS_PTR; - -typedef struct ck_rsa_pkcs_pss_params CK_RSA_PKCS_PSS_PARAMS; -typedef struct ck_rsa_pkcs_pss_params *CK_RSA_PKCS_PSS_PARAMS_PTR; - -typedef struct ck_rsa_pkcs_oaep_params CK_RSA_PKCS_OAEP_PARAMS; -typedef struct ck_rsa_pkcs_oaep_params *CK_RSA_PKCS_OAEP_PARAMS_PTR; - -typedef struct ck_aes_ctr_params CK_AES_CTR_PARAMS; -typedef struct ck_aes_ctr_params *CK_AES_CTR_PARAMS_PTR; - -typedef struct ck_gcm_params CK_GCM_PARAMS; -typedef struct ck_gcm_params *CK_GCM_PARAMS_PTR; - -typedef struct ck_ecdh1_derive_params CK_ECDH1_DERIVE_PARAMS; -typedef struct ck_ecdh1_derive_params *CK_ECDH1_DERIVE_PARAMS_PTR; - -typedef struct ck_key_derivation_string_data CK_KEY_DERIVATION_STRING_DATA; -typedef struct ck_key_derivation_string_data *CK_KEY_DERIVATION_STRING_DATA_PTR; - -typedef struct ck_des_cbc_encrypt_data_params CK_DES_CBC_ENCRYPT_DATA_PARAMS; -typedef struct ck_des_cbc_encrypt_data_params *CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR; - -typedef struct ck_aes_cbc_encrypt_data_params CK_AES_CBC_ENCRYPT_DATA_PARAMS; -typedef struct ck_aes_cbc_encrypt_data_params *CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR; - -#ifndef NULL_PTR -#define NULL_PTR NULL -#endif - -/* Delete the helper macros defined at the top of the file. */ -#undef ck_flags_t -#undef ck_version - -#undef ck_info -#undef cryptoki_version -#undef manufacturer_id -#undef library_description -#undef library_version - -#undef ck_notification_t -#undef ck_slot_id_t - -#undef ck_slot_info -#undef slot_description -#undef hardware_version -#undef firmware_version - -#undef ck_token_info -#undef serial_number -#undef max_session_count -#undef session_count -#undef max_rw_session_count -#undef rw_session_count -#undef max_pin_len -#undef min_pin_len -#undef total_public_memory -#undef free_public_memory -#undef total_private_memory -#undef free_private_memory -#undef utc_time - -#undef ck_session_handle_t -#undef ck_user_type_t -#undef ck_state_t - -#undef ck_session_info -#undef slot_id -#undef device_error - -#undef ck_object_handle_t -#undef ck_object_class_t -#undef ck_hw_feature_type_t -#undef ck_key_type_t -#undef ck_certificate_type_t -#undef ck_attribute_type_t - -#undef ck_attribute -#undef value -#undef value_len - -#undef params -#undef count - -#undef ck_date - -#undef ck_mechanism_type_t - -#undef ck_mechanism -#undef parameter -#undef parameter_len - -#undef ck_mechanism_info - -#undef ck_param_type -#undef ck_otp_param -#undef ck_otp_params -#undef ck_otp_signature_info - -#undef min_key_size -#undef max_key_size - -#undef ck_rv_t -#undef ck_notify_t - -#undef ck_function_list - -#undef ck_createmutex_t -#undef ck_destroymutex_t -#undef ck_lockmutex_t -#undef ck_unlockmutex_t - -#undef ck_c_initialize_args -#undef create_mutex -#undef destroy_mutex -#undef lock_mutex -#undef unlock_mutex -#undef reserved - -#endif /* CRYPTOKI_COMPAT */ - - -/* System dependencies. */ -#if defined(_WIN32) || defined(CRYPTOKI_FORCE_WIN32) -#pragma pack(pop, cryptoki) -#endif - -#if defined(__cplusplus) -} -#endif - -#endif /* PKCS11_H */ diff --git a/cryptoki-sys/src/bindings/aarch64-apple-darwin.rs b/cryptoki-sys/src/bindings/aarch64-apple-darwin.rs index 81bdfa3d..ecfed114 100644 --- a/cryptoki-sys/src/bindings/aarch64-apple-darwin.rs +++ b/cryptoki-sys/src/bindings/aarch64-apple-darwin.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,211 +894,407 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_VERSION() { - const UNINIT: ::std::mem::MaybeUninit<_CK_VERSION> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_ATTRIBUTE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_VERSION>(), - 2usize, - concat!("Size of: ", stringify!(_CK_VERSION)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - ::std::mem::align_of::<_CK_VERSION>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_VERSION)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(major) + stringify!(type_) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, - 1usize, + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(minor) + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ATTRIBUTE), + "::", + stringify!(ulValueLen) ) ); } +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, + pub pReserved: *mut ::std::os::raw::c_void, } #[test] -fn bindgen_test_layout__CK_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_C_INITIALIZE_ARGS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_INFO>(), - 88usize, - concat!("Size of: ", stringify!(_CK_INFO)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - ::std::mem::align_of::<_CK_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_INFO)) + concat!("Alignment of ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(cryptokiVersion) + stringify!(CreateMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 2usize, + unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(manufacturerID) + stringify!(DestroyMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 40usize, + unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(flags) + stringify!(LockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, - 48usize, + unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryDescription) + stringify!(UnlockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryVersion) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_C_INITIALIZE_ARGS), + "::", + stringify!(pReserved) ) ); } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], } #[test] -fn bindgen_test_layout__CK_SLOT_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SLOT_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_DATE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SLOT_INFO>(), - 112usize, - concat!("Size of: ", stringify!(_CK_SLOT_INFO)) + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_DATE)) ); assert_eq!( - ::std::mem::align_of::<_CK_SLOT_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_SLOT_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_DATE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(slotDescription) + stringify!(year) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 64usize, + unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(manufacturerID) + stringify!(month) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, + 6usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(flags) + stringify!(day) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_DERIVED_KEY() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 104usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTemplate) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(hardwareVersion) + stringify!(pTemplate) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 106usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAttributeCount) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(firmwareVersion) + stringify!(ulAttributeCount) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DERIVED_KEY), + "::", + stringify!(phKey) ) ); } -impl Default for _CK_SLOT_INFO { +impl Default for CK_DERIVED_KEY { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -888,258 +1303,323 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, } #[test] -fn bindgen_test_layout__CK_TOKEN_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_TOKEN_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_VERSION() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_TOKEN_INFO>(), - 208usize, - concat!("Size of: ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::size_of::(), + 2usize, + concat!("Size of: ", stringify!(CK_VERSION)) ); assert_eq!( - ::std::mem::align_of::<_CK_TOKEN_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_VERSION)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(label) + stringify!(major) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, + 1usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(manufacturerID) + stringify!(minor) ) ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, - 64usize, + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(model) + stringify!(cryptokiVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 2usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(serialNumber) + stringify!(manufacturerID) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, - 104usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, + 48usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulMaxSessionCount) + stringify!(libraryDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, - 112usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, + 80usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulSessionCount) + stringify!(libraryVersion) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_INTERFACE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, - 120usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulMaxRwSessionCount) - ) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, - 128usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulRwSessionCount) - ) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, - 136usize, + unsafe { ::std::ptr::addr_of!((*ptr).pInterfaceName) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMaxPinLen) + stringify!(pInterfaceName) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, - 144usize, + unsafe { ::std::ptr::addr_of!((*ptr).pFunctionList) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMinPinLen) + stringify!(pFunctionList) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, - 152usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulTotalPublicMemory) + stringify!(flags) ) ); +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, - 160usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePublicMemory) + stringify!(mechanism) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, - 168usize, + unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulTotalPrivateMemory) + stringify!(pParameter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, - 176usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePrivateMemory) + stringify!(ulParameterLen) ) ); +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM_INFO)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 184usize, + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(hardwareVersion) + stringify!(ulMinKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 186usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(firmwareVersion) + stringify!(ulMaxKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, - 188usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(utcTime) + stringify!(flags) ) ); } -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { +pub struct CK_SESSION_INFO { pub slotID: CK_SLOT_ID, pub state: CK_STATE, pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, + pub ulDeviceError: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_SESSION_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SESSION_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SESSION_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SESSION_INFO>(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(_CK_SESSION_INFO)) + concat!("Size of: ", stringify!(CK_SESSION_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_SESSION_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_SESSION_INFO)) + concat!("Alignment of ", stringify!(CK_SESSION_INFO)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).slotID) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(slotID) ) @@ -1149,7 +1629,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(state) ) @@ -1159,7 +1639,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(flags) ) @@ -1169,71 +1649,87 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(ulDeviceError) ) ); } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, } #[test] -fn bindgen_test_layout__CK_ATTRIBUTE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_ATTRIBUTE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SLOT_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_ATTRIBUTE>(), - 24usize, - concat!("Size of: ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_ATTRIBUTE>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_ATTRIBUTE)) + concat!("Alignment of ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(type_) + stringify!(slotDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(pValue) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(ulValueLen) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(hardwareVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 106usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(firmwareVersion) ) ); } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SLOT_INFO { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1244,464 +1740,499 @@ impl Default for _CK_ATTRIBUTE { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], } #[test] -fn bindgen_test_layout__CK_DATE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_DATE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_TOKEN_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_DATE>(), - 8usize, - concat!("Size of: ", stringify!(_CK_DATE)) + ::std::mem::size_of::(), + 208usize, + concat!("Size of: ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_DATE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_DATE)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(year) + stringify!(label) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(month) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, - 6usize, + unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(day) + stringify!(model) ) ); -} -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM)) + unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(serialNumber) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(mechanism) + stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParameter) + stringify!(ulMaxSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulParameterLen) + stringify!(ulSessionCount) ) ); -} -impl Default for _CK_MECHANISM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM_INFO> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM_INFO>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM_INFO)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM_INFO)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, + 120usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMinKeySize) + stringify!(ulMaxRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, + 128usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMaxKeySize) + stringify!(ulRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, + 136usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(flags) + stringify!(ulMaxPinLen) ) ); -} -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAM() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(CK_OTP_PARAM)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAM)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, + 144usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(type_) + stringify!(ulMinPinLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, + 152usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pValue) + stringify!(ulTotalPublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, + 160usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulValueLen) + stringify!(ulFreePublicMemory) ) ); -} -impl Default for CK_OTP_PARAM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAMS() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_PARAMS)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, + 168usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(ulTotalPrivateMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, + 176usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(ulFreePrivateMemory) ) ); -} -impl Default for CK_OTP_PARAMS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) - ); assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(hardwareVersion) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 186usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(firmwareVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, + 188usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(utcTime) ) ); } -impl Default for CK_OTP_SIGNATURE_INFO { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_pss_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_AES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_pss_params)) + concat!("Alignment of ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(hashAlg) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(mgf) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(sLen) + stringify!(length) ) ); } -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_oaep_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_oaep_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_oaep_params)) + concat!("Alignment of ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(hashAlg) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(source) + stringify!(ulNonceLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(pSourceData) + stringify!(pAAD) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, 32usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(ulSourceDataLen) + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_AES_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_rsa_pkcs_oaep_params { +impl Default for CK_AES_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1712,30 +2243,30 @@ impl Default for ck_rsa_pkcs_oaep_params { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], } #[test] -fn bindgen_test_layout_ck_aes_ctr_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 24usize, - concat!("Size of: ", stringify!(ck_aes_ctr_params)) + concat!("Size of: ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_ctr_params)) + concat!("Alignment of ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(ulCounterBits) ) @@ -1745,7 +2276,7 @@ fn bindgen_test_layout_ck_aes_ctr_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(cb) ) @@ -1753,34 +2284,34 @@ fn bindgen_test_layout_ck_aes_ctr_params() { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_gcm_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 48usize, - concat!("Size of: ", stringify!(ck_gcm_params)) + concat!("Size of: ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_gcm_params)) + concat!("Alignment of ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pIv) ) @@ -1790,7 +2321,7 @@ fn bindgen_test_layout_ck_gcm_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvLen) ) @@ -1800,7 +2331,7 @@ fn bindgen_test_layout_ck_gcm_params() { 16usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvBits) ) @@ -1810,7 +2341,7 @@ fn bindgen_test_layout_ck_gcm_params() { 24usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pAAD) ) @@ -1820,7 +2351,7 @@ fn bindgen_test_layout_ck_gcm_params() { 32usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulAADLen) ) @@ -1830,13 +2361,13 @@ fn bindgen_test_layout_ck_gcm_params() { 40usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulTagBits) ) ); } -impl Default for ck_gcm_params { +impl Default for CK_AES_GCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1845,83 +2376,125 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_ecdh1_derive_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_ARIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_ecdh1_derive_params)) + concat!("Alignment of ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(kdf) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulSharedDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pSharedData) + stringify!(length) ) ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, - 24usize, +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulPublicDataLen) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pPublicData) + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) ) ); } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1931,48 +2504,145 @@ impl Default for ck_ecdh1_derive_params { } } #[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(ulCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cb) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(cb) + ) + ); +} +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_key_derivation_string_data() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_CCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(ck_key_derivation_string_data)) + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_key_derivation_string_data)) + concat!("Alignment of ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(pData) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(ulLen) + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceFixedBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).nonceGenerator) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(nonceGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMAC) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pMAC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_key_derivation_string_data { +impl Default for CK_CCM_MESSAGE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1983,58 +2653,90 @@ impl Default for ck_key_derivation_string_data { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_des_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_des_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(iv) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(length) + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2045,58 +2747,68 @@ impl Default for ck_des_cbc_encrypt_data_params { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_aes_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CHACHA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Size of: ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(iv) + stringify!(pBlockCounter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).blockCounterBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CHACHA20_PARAMS), + "::", + stringify!(blockCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(length) + stringify!(ulNonceBits) ) ); } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_CHACHA20_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2105,478 +2817,7027 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_Initialize = - ::std::option::Option CK_RV>; -pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; -pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, ->; -pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismList = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismInfo = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, - ) -> CK_RV, ->; -pub type CK_C_InitToken = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, - ) -> CK_RV, ->; -pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_OpenSession = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; -pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; -pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, ->; -pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_Login = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_Logout = - ::std::option::Option CK_RV>; -pub type CK_C_CreateObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CopyObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, ->; -pub type CK_C_GetObjectSize = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjects = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; -pub type CK_C_EncryptInit = ::std::option::Option< +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CMS_SIG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).certificateHandle) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(certificateHandle) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSigningMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pSigningMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDigestMechanism) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pDigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContentType) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pContentType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequestedAttributes) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequestedAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequestedAttributesLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequestedAttributesLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequiredAttributes) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequiredAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequiredAttributesLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequiredAttributesLen) + ) + ); +} +impl Default for CK_CMS_SIG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DSA_PARAMETER_GEN_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(hash) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIndex) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulIndex) + ) + ); +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pSharedData) + ) + ); +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_ECMQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_EDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phFlag) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(phFlag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(ulContextDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(pContextData) + ) + ); +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvFixedBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ivGenerator) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ivGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pTag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pWrapOID) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pWrapOID) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWrapOIDLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulWrapOIDLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(hKey) + ) + ); +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_HKDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExtract) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExtract) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExpand) as usize - ptr as usize }, + 1usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExpand) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltType) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hSaltKey) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(hSaltKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulInfoLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulInfoLen) + ) + ); +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_KEA_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).isSender) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(isSender) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomA) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomB) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomB) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_DERIVATION_STRING_DATA() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(ulLen) + ) + ); +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_WRAP_SET_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bBC) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(bBC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(pX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulXLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(ulXLen) + ) + ); +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KIP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PBE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitVector) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pInitVector) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIteration) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulIteration) + ) + ); +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS2() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PRF_DATA_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[test] +fn bindgen_test_layout_CK_RC2_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(iv) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC2_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulRounds) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +#[test] +fn bindgen_test_layout_CK_RSA_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOAEPParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pOAEPParams) + ) + ); +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(source) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(pSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(ulSourceDataLen) + ) + ); +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_PSS_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(sLen) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!( + "Size of: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pTag) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pBlockCounter) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(ulNonceBits) + ) + ); +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SEED_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_PRIVATE_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPAndGLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPAndGLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulQLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulQLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrimeP) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPrimeP) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBaseG) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pBaseG) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSubprimeQ) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pSubprimeQ) + ) + ); +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_RELAYX_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldWrappedXLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldWrappedXLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldWrappedX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldWrappedX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPassword) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPassword) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPublicDataLen) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPublicData) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewRandomLen) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewRandomA) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewRandomA) + ) + ); +} +impl Default for CK_SKIPJACK_RELAYX_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_COUNTER_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_DKM_LENGTH_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).dkmLengthMethod) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(dkmLengthMethod) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_FEEDBACK_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulIVLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pIV) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_INITIALIZE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).initiator_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(initiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_INITIATE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_prekey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_signature) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPrekey_signature) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_key) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOnetime_key) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_identity) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_ephemeral) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_ephemeral) + ) + ); +} +impl Default for CK_X3DH_INITIATE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIdentity_id) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pIdentity_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_id) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pPrekey_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_id) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pOnetime_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_identity) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_ephemeral) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_ephemeral) + ) + ); +} +impl Default for CK_X3DH_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_MQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).OtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(OtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, +} +#[test] +fn bindgen_test_layout_CK_XEDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_XEDDSA_PARAMS), + "::", + stringify!(hash) + ) + ); +} +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerMacSecret) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerKey) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVClient) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVClient) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVServer) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVServer) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SSL3_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_SSL3_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(prfMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulLabelLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pContextData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLength) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulContextDataLength) + ) + ); +} +impl Default for CK_TLS_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_MAC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerOrClient) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulServerOrClient) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_TLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(pIV) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSequenceNumber) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulSequenceNumber) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_WTLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +pub type CK_C_Initialize = + ::std::option::Option CK_RV>; +pub type CK_C_Finalize = + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; +pub type CK_C_GetSlotList = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; +pub type CK_C_GetTokenInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, +>; +pub type CK_C_GetMechanismList = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetMechanismInfo = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, + ) -> CK_RV, +>; +pub type CK_C_InitToken = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + ) -> CK_RV, +>; +pub type CK_C_InitPIN = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetPIN = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_OpenSession = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CloseSession = + ::std::option::Option CK_RV>; +pub type CK_C_CloseAllSessions = + ::std::option::Option CK_RV>; +pub type CK_C_GetSessionInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, +>; +pub type CK_C_GetOperationState = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetOperationState = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_Login = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_Logout = + ::std::option::Option CK_RV>; +pub type CK_C_CreateObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CopyObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DestroyObject = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, +>; +pub type CK_C_GetObjectSize = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsInit = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_FindObjects = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsFinal = + ::std::option::Option CK_RV>; +pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Sign = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SignFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SignRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Verify = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_VerifyRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptDigestUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_UnwrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DeriveKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; +pub type CK_C_LoginUser = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, +} +#[test] +fn bindgen_test_layout_CK_FUNCTION_LIST_3_0() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 744usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(version) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Initialize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Finalize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetTokenInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitToken) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_OpenSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, + 112usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseAllSessions) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, + 128usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSessionInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, + 144usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, + 152usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Login) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, + 160usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Logout) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, + 168usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CreateObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, + 176usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CopyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DestroyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, + 192usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetObjectSize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, + 200usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, + 208usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, + 216usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, + 224usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjects) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, + 232usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, + 240usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, + 248usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Encrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, + 256usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, + 264usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, + 272usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, + 280usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Decrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, + 288usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, + 296usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, + 304usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, + 312usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Digest) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, + 320usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, + 328usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, + 336usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, + 344usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, + 352usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Sign) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, + 360usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, + 368usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, + 376usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, + 384usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, + 392usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, + 400usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Verify) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, + 408usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, + 416usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, + 424usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, + 432usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, + 440usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, + 448usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptDigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, + 456usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, + 464usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptVerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, + 472usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, + 480usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKeyPair) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, + 488usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, + 496usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_UnwrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, + 504usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DeriveKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, + 512usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SeedRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, + 520usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, + 528usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionStatus) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, + 536usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CancelFunction) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, + 544usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WaitForSlotEvent) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterfaceList) as usize - ptr as usize }, + 552usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterfaceList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterface) as usize - ptr as usize }, + 560usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterface) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_LoginUser) as usize - ptr as usize }, + 568usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_LoginUser) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SessionCancel) as usize - ptr as usize }, + 576usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SessionCancel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptInit) as usize - ptr as usize }, + 584usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessage) as usize - ptr as usize }, + 592usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageBegin) as usize - ptr as usize }, + 600usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageNext) as usize - ptr as usize }, + 608usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptFinal) as usize - ptr as usize }, + 616usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptInit) as usize - ptr as usize }, + 624usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessage) as usize - ptr as usize }, + 632usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageBegin) as usize - ptr as usize }, + 640usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageNext) as usize - ptr as usize }, + 648usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptFinal) as usize - ptr as usize }, + 656usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignInit) as usize - ptr as usize }, + 664usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessage) as usize - ptr as usize }, + 672usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageBegin) as usize - ptr as usize }, + 680usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageNext) as usize - ptr as usize }, + 688usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignFinal) as usize - ptr as usize }, + 696usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyInit) as usize - ptr as usize }, + 704usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessage) as usize - ptr as usize }, + 712usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageBegin) as usize - ptr as usize }, + 720usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageNext) as usize - ptr as usize }, + 728usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyFinal) as usize - ptr as usize }, + 736usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyFinal) + ) + ); +} #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -2647,25 +9908,25 @@ pub struct _CK_FUNCTION_LIST { pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } #[test] -fn bindgen_test_layout__CK_FUNCTION_LIST() { - const UNINIT: ::std::mem::MaybeUninit<_CK_FUNCTION_LIST> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_FUNCTION_LIST() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_FUNCTION_LIST>(), + ::std::mem::size_of::(), 552usize, - concat!("Size of: ", stringify!(_CK_FUNCTION_LIST)) + concat!("Size of: ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( - ::std::mem::align_of::<_CK_FUNCTION_LIST>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_FUNCTION_LIST)) + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(version) ) @@ -2675,7 +9936,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Initialize) ) @@ -2685,7 +9946,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Finalize) ) @@ -2695,7 +9956,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetInfo) ) @@ -2705,7 +9966,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 32usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionList) ) @@ -2715,7 +9976,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 40usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotList) ) @@ -2725,7 +9986,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 48usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotInfo) ) @@ -2735,7 +9996,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 56usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetTokenInfo) ) @@ -2745,7 +10006,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 64usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismList) ) @@ -2755,7 +10016,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 72usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismInfo) ) @@ -2765,7 +10026,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 80usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitToken) ) @@ -2775,7 +10036,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 88usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitPIN) ) @@ -2785,7 +10046,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 96usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetPIN) ) @@ -2795,7 +10056,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 104usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_OpenSession) ) @@ -2805,7 +10066,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 112usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseSession) ) @@ -2815,7 +10076,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 120usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseAllSessions) ) @@ -2825,7 +10086,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 128usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSessionInfo) ) @@ -2835,7 +10096,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 136usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetOperationState) ) @@ -2845,7 +10106,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 144usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetOperationState) ) @@ -2855,7 +10116,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 152usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Login) ) @@ -2865,7 +10126,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 160usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Logout) ) @@ -2875,7 +10136,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 168usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CreateObject) ) @@ -2885,7 +10146,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 176usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CopyObject) ) @@ -2895,7 +10156,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 184usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DestroyObject) ) @@ -2905,7 +10166,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 192usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetObjectSize) ) @@ -2915,7 +10176,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 200usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetAttributeValue) ) @@ -2925,7 +10186,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 208usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetAttributeValue) ) @@ -2935,7 +10196,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 216usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsInit) ) @@ -2945,7 +10206,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 224usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjects) ) @@ -2955,7 +10216,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 232usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsFinal) ) @@ -2965,7 +10226,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 240usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptInit) ) @@ -2975,7 +10236,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 248usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Encrypt) ) @@ -2985,7 +10246,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 256usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptUpdate) ) @@ -2995,7 +10256,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 264usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptFinal) ) @@ -3005,7 +10266,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 272usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptInit) ) @@ -3015,7 +10276,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 280usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Decrypt) ) @@ -3025,7 +10286,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 288usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptUpdate) ) @@ -3035,7 +10296,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 296usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptFinal) ) @@ -3045,7 +10306,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 304usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestInit) ) @@ -3055,7 +10316,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 312usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Digest) ) @@ -3065,7 +10326,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 320usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestUpdate) ) @@ -3075,7 +10336,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 328usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestKey) ) @@ -3085,7 +10346,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 336usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestFinal) ) @@ -3095,7 +10356,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 344usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignInit) ) @@ -3105,7 +10366,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 352usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Sign) ) @@ -3115,7 +10376,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 360usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignUpdate) ) @@ -3125,7 +10386,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 368usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignFinal) ) @@ -3135,7 +10396,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 376usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecoverInit) ) @@ -3145,7 +10406,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 384usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecover) ) @@ -3155,7 +10416,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 392usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyInit) ) @@ -3165,7 +10426,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 400usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Verify) ) @@ -3175,7 +10436,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 408usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyUpdate) ) @@ -3185,7 +10446,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 416usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyFinal) ) @@ -3195,7 +10456,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 424usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecoverInit) ) @@ -3205,7 +10466,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 432usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecover) ) @@ -3215,7 +10476,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 440usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestEncryptUpdate) ) @@ -3225,7 +10486,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 448usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptDigestUpdate) ) @@ -3235,7 +10496,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 456usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignEncryptUpdate) ) @@ -3245,7 +10506,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 464usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptVerifyUpdate) ) @@ -3255,7 +10516,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 472usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKey) ) @@ -3265,7 +10526,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 480usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKeyPair) ) @@ -3275,7 +10536,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 488usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WrapKey) ) @@ -3285,7 +10546,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 496usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_UnwrapKey) ) @@ -3295,7 +10556,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 504usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DeriveKey) ) @@ -3305,7 +10566,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 512usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SeedRandom) ) @@ -3315,7 +10576,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 520usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateRandom) ) @@ -3325,7 +10586,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 528usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionStatus) ) @@ -3335,7 +10596,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 536usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CancelFunction) ) @@ -3345,704 +10606,716 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 544usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WaitForSlotEvent) ) ); } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -#[test] -fn bindgen_test_layout__CK_C_INITIALIZE_ARGS() { - const UNINIT: ::std::mem::MaybeUninit<_CK_C_INITIALIZE_ARGS> = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_C_INITIALIZE_ARGS>(), - 48usize, - concat!("Size of: ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_C_INITIALIZE_ARGS>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(CreateMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, - 8usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(DestroyMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, - 16usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(LockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, - 24usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(UnlockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 32usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(flags) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, - 40usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(pReserved) - ) - ); -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], -} -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, + ::libloading::Error, + >, + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -4064,7 +11337,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -4125,6 +11397,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -4134,7 +11431,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -4195,872 +11491,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/bindings/aarch64-unknown-linux-gnu.rs b/cryptoki-sys/src/bindings/aarch64-unknown-linux-gnu.rs index 81bdfa3d..ecfed114 100644 --- a/cryptoki-sys/src/bindings/aarch64-unknown-linux-gnu.rs +++ b/cryptoki-sys/src/bindings/aarch64-unknown-linux-gnu.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,211 +894,407 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_VERSION() { - const UNINIT: ::std::mem::MaybeUninit<_CK_VERSION> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_ATTRIBUTE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_VERSION>(), - 2usize, - concat!("Size of: ", stringify!(_CK_VERSION)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - ::std::mem::align_of::<_CK_VERSION>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_VERSION)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(major) + stringify!(type_) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, - 1usize, + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(minor) + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ATTRIBUTE), + "::", + stringify!(ulValueLen) ) ); } +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, + pub pReserved: *mut ::std::os::raw::c_void, } #[test] -fn bindgen_test_layout__CK_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_C_INITIALIZE_ARGS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_INFO>(), - 88usize, - concat!("Size of: ", stringify!(_CK_INFO)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - ::std::mem::align_of::<_CK_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_INFO)) + concat!("Alignment of ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(cryptokiVersion) + stringify!(CreateMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 2usize, + unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(manufacturerID) + stringify!(DestroyMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 40usize, + unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(flags) + stringify!(LockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, - 48usize, + unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryDescription) + stringify!(UnlockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryVersion) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_C_INITIALIZE_ARGS), + "::", + stringify!(pReserved) ) ); } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], } #[test] -fn bindgen_test_layout__CK_SLOT_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SLOT_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_DATE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SLOT_INFO>(), - 112usize, - concat!("Size of: ", stringify!(_CK_SLOT_INFO)) + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_DATE)) ); assert_eq!( - ::std::mem::align_of::<_CK_SLOT_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_SLOT_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_DATE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(slotDescription) + stringify!(year) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 64usize, + unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(manufacturerID) + stringify!(month) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, + 6usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(flags) + stringify!(day) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_DERIVED_KEY() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 104usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTemplate) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(hardwareVersion) + stringify!(pTemplate) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 106usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAttributeCount) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(firmwareVersion) + stringify!(ulAttributeCount) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DERIVED_KEY), + "::", + stringify!(phKey) ) ); } -impl Default for _CK_SLOT_INFO { +impl Default for CK_DERIVED_KEY { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -888,258 +1303,323 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, } #[test] -fn bindgen_test_layout__CK_TOKEN_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_TOKEN_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_VERSION() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_TOKEN_INFO>(), - 208usize, - concat!("Size of: ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::size_of::(), + 2usize, + concat!("Size of: ", stringify!(CK_VERSION)) ); assert_eq!( - ::std::mem::align_of::<_CK_TOKEN_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_VERSION)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(label) + stringify!(major) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, + 1usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(manufacturerID) + stringify!(minor) ) ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, - 64usize, + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(model) + stringify!(cryptokiVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 2usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(serialNumber) + stringify!(manufacturerID) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, - 104usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, + 48usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulMaxSessionCount) + stringify!(libraryDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, - 112usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, + 80usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulSessionCount) + stringify!(libraryVersion) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_INTERFACE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, - 120usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulMaxRwSessionCount) - ) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, - 128usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulRwSessionCount) - ) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, - 136usize, + unsafe { ::std::ptr::addr_of!((*ptr).pInterfaceName) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMaxPinLen) + stringify!(pInterfaceName) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, - 144usize, + unsafe { ::std::ptr::addr_of!((*ptr).pFunctionList) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMinPinLen) + stringify!(pFunctionList) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, - 152usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulTotalPublicMemory) + stringify!(flags) ) ); +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, - 160usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePublicMemory) + stringify!(mechanism) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, - 168usize, + unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulTotalPrivateMemory) + stringify!(pParameter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, - 176usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePrivateMemory) + stringify!(ulParameterLen) ) ); +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM_INFO)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 184usize, + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(hardwareVersion) + stringify!(ulMinKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 186usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(firmwareVersion) + stringify!(ulMaxKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, - 188usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(utcTime) + stringify!(flags) ) ); } -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { +pub struct CK_SESSION_INFO { pub slotID: CK_SLOT_ID, pub state: CK_STATE, pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, + pub ulDeviceError: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_SESSION_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SESSION_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SESSION_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SESSION_INFO>(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(_CK_SESSION_INFO)) + concat!("Size of: ", stringify!(CK_SESSION_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_SESSION_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_SESSION_INFO)) + concat!("Alignment of ", stringify!(CK_SESSION_INFO)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).slotID) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(slotID) ) @@ -1149,7 +1629,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(state) ) @@ -1159,7 +1639,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(flags) ) @@ -1169,71 +1649,87 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(ulDeviceError) ) ); } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, } #[test] -fn bindgen_test_layout__CK_ATTRIBUTE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_ATTRIBUTE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SLOT_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_ATTRIBUTE>(), - 24usize, - concat!("Size of: ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_ATTRIBUTE>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_ATTRIBUTE)) + concat!("Alignment of ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(type_) + stringify!(slotDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(pValue) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(ulValueLen) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(hardwareVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 106usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(firmwareVersion) ) ); } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SLOT_INFO { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1244,464 +1740,499 @@ impl Default for _CK_ATTRIBUTE { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], } #[test] -fn bindgen_test_layout__CK_DATE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_DATE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_TOKEN_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_DATE>(), - 8usize, - concat!("Size of: ", stringify!(_CK_DATE)) + ::std::mem::size_of::(), + 208usize, + concat!("Size of: ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_DATE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_DATE)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(year) + stringify!(label) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(month) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, - 6usize, + unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(day) + stringify!(model) ) ); -} -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM)) + unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(serialNumber) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(mechanism) + stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParameter) + stringify!(ulMaxSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulParameterLen) + stringify!(ulSessionCount) ) ); -} -impl Default for _CK_MECHANISM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM_INFO> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM_INFO>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM_INFO)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM_INFO)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, + 120usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMinKeySize) + stringify!(ulMaxRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, + 128usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMaxKeySize) + stringify!(ulRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, + 136usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(flags) + stringify!(ulMaxPinLen) ) ); -} -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAM() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(CK_OTP_PARAM)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAM)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, + 144usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(type_) + stringify!(ulMinPinLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, + 152usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pValue) + stringify!(ulTotalPublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, + 160usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulValueLen) + stringify!(ulFreePublicMemory) ) ); -} -impl Default for CK_OTP_PARAM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAMS() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_PARAMS)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, + 168usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(ulTotalPrivateMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, + 176usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(ulFreePrivateMemory) ) ); -} -impl Default for CK_OTP_PARAMS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) - ); assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(hardwareVersion) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 186usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(firmwareVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, + 188usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(utcTime) ) ); } -impl Default for CK_OTP_SIGNATURE_INFO { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_pss_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_AES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_pss_params)) + concat!("Alignment of ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(hashAlg) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(mgf) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(sLen) + stringify!(length) ) ); } -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_oaep_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_oaep_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_oaep_params)) + concat!("Alignment of ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(hashAlg) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(source) + stringify!(ulNonceLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(pSourceData) + stringify!(pAAD) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, 32usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(ulSourceDataLen) + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_AES_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_rsa_pkcs_oaep_params { +impl Default for CK_AES_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1712,30 +2243,30 @@ impl Default for ck_rsa_pkcs_oaep_params { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], } #[test] -fn bindgen_test_layout_ck_aes_ctr_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 24usize, - concat!("Size of: ", stringify!(ck_aes_ctr_params)) + concat!("Size of: ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_ctr_params)) + concat!("Alignment of ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(ulCounterBits) ) @@ -1745,7 +2276,7 @@ fn bindgen_test_layout_ck_aes_ctr_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(cb) ) @@ -1753,34 +2284,34 @@ fn bindgen_test_layout_ck_aes_ctr_params() { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_gcm_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 48usize, - concat!("Size of: ", stringify!(ck_gcm_params)) + concat!("Size of: ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_gcm_params)) + concat!("Alignment of ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pIv) ) @@ -1790,7 +2321,7 @@ fn bindgen_test_layout_ck_gcm_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvLen) ) @@ -1800,7 +2331,7 @@ fn bindgen_test_layout_ck_gcm_params() { 16usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvBits) ) @@ -1810,7 +2341,7 @@ fn bindgen_test_layout_ck_gcm_params() { 24usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pAAD) ) @@ -1820,7 +2351,7 @@ fn bindgen_test_layout_ck_gcm_params() { 32usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulAADLen) ) @@ -1830,13 +2361,13 @@ fn bindgen_test_layout_ck_gcm_params() { 40usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulTagBits) ) ); } -impl Default for ck_gcm_params { +impl Default for CK_AES_GCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1845,83 +2376,125 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_ecdh1_derive_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_ARIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_ecdh1_derive_params)) + concat!("Alignment of ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(kdf) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulSharedDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pSharedData) + stringify!(length) ) ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, - 24usize, +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulPublicDataLen) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pPublicData) + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) ) ); } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1931,48 +2504,145 @@ impl Default for ck_ecdh1_derive_params { } } #[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(ulCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cb) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(cb) + ) + ); +} +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_key_derivation_string_data() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_CCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(ck_key_derivation_string_data)) + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_key_derivation_string_data)) + concat!("Alignment of ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(pData) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(ulLen) + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceFixedBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).nonceGenerator) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(nonceGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMAC) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pMAC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_key_derivation_string_data { +impl Default for CK_CCM_MESSAGE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1983,58 +2653,90 @@ impl Default for ck_key_derivation_string_data { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_des_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_des_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(iv) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(length) + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2045,58 +2747,68 @@ impl Default for ck_des_cbc_encrypt_data_params { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_aes_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CHACHA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Size of: ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(iv) + stringify!(pBlockCounter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).blockCounterBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CHACHA20_PARAMS), + "::", + stringify!(blockCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(length) + stringify!(ulNonceBits) ) ); } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_CHACHA20_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2105,478 +2817,7027 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_Initialize = - ::std::option::Option CK_RV>; -pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; -pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, ->; -pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismList = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismInfo = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, - ) -> CK_RV, ->; -pub type CK_C_InitToken = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, - ) -> CK_RV, ->; -pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_OpenSession = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; -pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; -pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, ->; -pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_Login = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_Logout = - ::std::option::Option CK_RV>; -pub type CK_C_CreateObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CopyObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, ->; -pub type CK_C_GetObjectSize = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjects = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; -pub type CK_C_EncryptInit = ::std::option::Option< +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CMS_SIG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).certificateHandle) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(certificateHandle) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSigningMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pSigningMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDigestMechanism) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pDigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContentType) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pContentType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequestedAttributes) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequestedAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequestedAttributesLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequestedAttributesLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequiredAttributes) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequiredAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequiredAttributesLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequiredAttributesLen) + ) + ); +} +impl Default for CK_CMS_SIG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DSA_PARAMETER_GEN_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(hash) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIndex) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulIndex) + ) + ); +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pSharedData) + ) + ); +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_ECMQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_EDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phFlag) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(phFlag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(ulContextDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(pContextData) + ) + ); +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvFixedBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ivGenerator) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ivGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pTag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pWrapOID) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pWrapOID) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWrapOIDLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulWrapOIDLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(hKey) + ) + ); +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_HKDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExtract) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExtract) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExpand) as usize - ptr as usize }, + 1usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExpand) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltType) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hSaltKey) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(hSaltKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulInfoLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulInfoLen) + ) + ); +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_KEA_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).isSender) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(isSender) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomA) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomB) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomB) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_DERIVATION_STRING_DATA() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(ulLen) + ) + ); +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_WRAP_SET_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bBC) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(bBC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(pX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulXLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(ulXLen) + ) + ); +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KIP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PBE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitVector) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pInitVector) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIteration) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulIteration) + ) + ); +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS2() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PRF_DATA_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[test] +fn bindgen_test_layout_CK_RC2_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(iv) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC2_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulRounds) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +#[test] +fn bindgen_test_layout_CK_RSA_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOAEPParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pOAEPParams) + ) + ); +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(source) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(pSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(ulSourceDataLen) + ) + ); +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_PSS_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(sLen) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!( + "Size of: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pTag) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pBlockCounter) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(ulNonceBits) + ) + ); +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SEED_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_PRIVATE_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPAndGLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPAndGLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulQLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulQLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrimeP) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPrimeP) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBaseG) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pBaseG) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSubprimeQ) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pSubprimeQ) + ) + ); +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_RELAYX_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldWrappedXLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldWrappedXLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldWrappedX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldWrappedX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPassword) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPassword) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPublicDataLen) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPublicData) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewRandomLen) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewRandomA) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewRandomA) + ) + ); +} +impl Default for CK_SKIPJACK_RELAYX_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_COUNTER_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_DKM_LENGTH_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).dkmLengthMethod) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(dkmLengthMethod) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_FEEDBACK_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulIVLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pIV) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_INITIALIZE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).initiator_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(initiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_INITIATE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_prekey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_signature) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPrekey_signature) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_key) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOnetime_key) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_identity) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_ephemeral) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_ephemeral) + ) + ); +} +impl Default for CK_X3DH_INITIATE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIdentity_id) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pIdentity_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_id) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pPrekey_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_id) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pOnetime_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_identity) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_ephemeral) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_ephemeral) + ) + ); +} +impl Default for CK_X3DH_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_MQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).OtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(OtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, +} +#[test] +fn bindgen_test_layout_CK_XEDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_XEDDSA_PARAMS), + "::", + stringify!(hash) + ) + ); +} +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerMacSecret) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerKey) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVClient) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVClient) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVServer) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVServer) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SSL3_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_SSL3_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(prfMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulLabelLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pContextData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLength) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulContextDataLength) + ) + ); +} +impl Default for CK_TLS_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_MAC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerOrClient) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulServerOrClient) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_TLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(pIV) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSequenceNumber) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulSequenceNumber) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_WTLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +pub type CK_C_Initialize = + ::std::option::Option CK_RV>; +pub type CK_C_Finalize = + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; +pub type CK_C_GetSlotList = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; +pub type CK_C_GetTokenInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, +>; +pub type CK_C_GetMechanismList = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetMechanismInfo = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, + ) -> CK_RV, +>; +pub type CK_C_InitToken = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + ) -> CK_RV, +>; +pub type CK_C_InitPIN = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetPIN = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_OpenSession = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CloseSession = + ::std::option::Option CK_RV>; +pub type CK_C_CloseAllSessions = + ::std::option::Option CK_RV>; +pub type CK_C_GetSessionInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, +>; +pub type CK_C_GetOperationState = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetOperationState = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_Login = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_Logout = + ::std::option::Option CK_RV>; +pub type CK_C_CreateObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CopyObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DestroyObject = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, +>; +pub type CK_C_GetObjectSize = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsInit = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_FindObjects = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsFinal = + ::std::option::Option CK_RV>; +pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Sign = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SignFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SignRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Verify = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_VerifyRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptDigestUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_UnwrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DeriveKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; +pub type CK_C_LoginUser = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, +} +#[test] +fn bindgen_test_layout_CK_FUNCTION_LIST_3_0() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 744usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(version) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Initialize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Finalize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetTokenInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitToken) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_OpenSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, + 112usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseAllSessions) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, + 128usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSessionInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, + 144usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, + 152usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Login) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, + 160usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Logout) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, + 168usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CreateObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, + 176usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CopyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DestroyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, + 192usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetObjectSize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, + 200usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, + 208usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, + 216usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, + 224usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjects) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, + 232usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, + 240usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, + 248usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Encrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, + 256usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, + 264usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, + 272usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, + 280usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Decrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, + 288usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, + 296usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, + 304usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, + 312usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Digest) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, + 320usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, + 328usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, + 336usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, + 344usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, + 352usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Sign) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, + 360usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, + 368usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, + 376usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, + 384usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, + 392usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, + 400usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Verify) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, + 408usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, + 416usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, + 424usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, + 432usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, + 440usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, + 448usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptDigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, + 456usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, + 464usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptVerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, + 472usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, + 480usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKeyPair) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, + 488usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, + 496usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_UnwrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, + 504usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DeriveKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, + 512usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SeedRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, + 520usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, + 528usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionStatus) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, + 536usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CancelFunction) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, + 544usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WaitForSlotEvent) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterfaceList) as usize - ptr as usize }, + 552usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterfaceList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterface) as usize - ptr as usize }, + 560usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterface) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_LoginUser) as usize - ptr as usize }, + 568usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_LoginUser) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SessionCancel) as usize - ptr as usize }, + 576usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SessionCancel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptInit) as usize - ptr as usize }, + 584usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessage) as usize - ptr as usize }, + 592usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageBegin) as usize - ptr as usize }, + 600usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageNext) as usize - ptr as usize }, + 608usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptFinal) as usize - ptr as usize }, + 616usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptInit) as usize - ptr as usize }, + 624usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessage) as usize - ptr as usize }, + 632usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageBegin) as usize - ptr as usize }, + 640usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageNext) as usize - ptr as usize }, + 648usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptFinal) as usize - ptr as usize }, + 656usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignInit) as usize - ptr as usize }, + 664usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessage) as usize - ptr as usize }, + 672usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageBegin) as usize - ptr as usize }, + 680usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageNext) as usize - ptr as usize }, + 688usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignFinal) as usize - ptr as usize }, + 696usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyInit) as usize - ptr as usize }, + 704usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessage) as usize - ptr as usize }, + 712usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageBegin) as usize - ptr as usize }, + 720usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageNext) as usize - ptr as usize }, + 728usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyFinal) as usize - ptr as usize }, + 736usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyFinal) + ) + ); +} #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -2647,25 +9908,25 @@ pub struct _CK_FUNCTION_LIST { pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } #[test] -fn bindgen_test_layout__CK_FUNCTION_LIST() { - const UNINIT: ::std::mem::MaybeUninit<_CK_FUNCTION_LIST> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_FUNCTION_LIST() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_FUNCTION_LIST>(), + ::std::mem::size_of::(), 552usize, - concat!("Size of: ", stringify!(_CK_FUNCTION_LIST)) + concat!("Size of: ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( - ::std::mem::align_of::<_CK_FUNCTION_LIST>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_FUNCTION_LIST)) + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(version) ) @@ -2675,7 +9936,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Initialize) ) @@ -2685,7 +9946,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Finalize) ) @@ -2695,7 +9956,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetInfo) ) @@ -2705,7 +9966,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 32usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionList) ) @@ -2715,7 +9976,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 40usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotList) ) @@ -2725,7 +9986,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 48usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotInfo) ) @@ -2735,7 +9996,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 56usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetTokenInfo) ) @@ -2745,7 +10006,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 64usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismList) ) @@ -2755,7 +10016,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 72usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismInfo) ) @@ -2765,7 +10026,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 80usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitToken) ) @@ -2775,7 +10036,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 88usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitPIN) ) @@ -2785,7 +10046,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 96usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetPIN) ) @@ -2795,7 +10056,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 104usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_OpenSession) ) @@ -2805,7 +10066,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 112usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseSession) ) @@ -2815,7 +10076,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 120usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseAllSessions) ) @@ -2825,7 +10086,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 128usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSessionInfo) ) @@ -2835,7 +10096,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 136usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetOperationState) ) @@ -2845,7 +10106,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 144usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetOperationState) ) @@ -2855,7 +10116,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 152usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Login) ) @@ -2865,7 +10126,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 160usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Logout) ) @@ -2875,7 +10136,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 168usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CreateObject) ) @@ -2885,7 +10146,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 176usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CopyObject) ) @@ -2895,7 +10156,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 184usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DestroyObject) ) @@ -2905,7 +10166,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 192usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetObjectSize) ) @@ -2915,7 +10176,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 200usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetAttributeValue) ) @@ -2925,7 +10186,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 208usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetAttributeValue) ) @@ -2935,7 +10196,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 216usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsInit) ) @@ -2945,7 +10206,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 224usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjects) ) @@ -2955,7 +10216,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 232usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsFinal) ) @@ -2965,7 +10226,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 240usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptInit) ) @@ -2975,7 +10236,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 248usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Encrypt) ) @@ -2985,7 +10246,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 256usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptUpdate) ) @@ -2995,7 +10256,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 264usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptFinal) ) @@ -3005,7 +10266,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 272usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptInit) ) @@ -3015,7 +10276,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 280usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Decrypt) ) @@ -3025,7 +10286,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 288usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptUpdate) ) @@ -3035,7 +10296,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 296usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptFinal) ) @@ -3045,7 +10306,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 304usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestInit) ) @@ -3055,7 +10316,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 312usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Digest) ) @@ -3065,7 +10326,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 320usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestUpdate) ) @@ -3075,7 +10336,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 328usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestKey) ) @@ -3085,7 +10346,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 336usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestFinal) ) @@ -3095,7 +10356,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 344usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignInit) ) @@ -3105,7 +10366,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 352usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Sign) ) @@ -3115,7 +10376,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 360usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignUpdate) ) @@ -3125,7 +10386,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 368usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignFinal) ) @@ -3135,7 +10396,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 376usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecoverInit) ) @@ -3145,7 +10406,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 384usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecover) ) @@ -3155,7 +10416,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 392usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyInit) ) @@ -3165,7 +10426,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 400usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Verify) ) @@ -3175,7 +10436,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 408usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyUpdate) ) @@ -3185,7 +10446,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 416usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyFinal) ) @@ -3195,7 +10456,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 424usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecoverInit) ) @@ -3205,7 +10466,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 432usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecover) ) @@ -3215,7 +10476,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 440usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestEncryptUpdate) ) @@ -3225,7 +10486,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 448usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptDigestUpdate) ) @@ -3235,7 +10496,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 456usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignEncryptUpdate) ) @@ -3245,7 +10506,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 464usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptVerifyUpdate) ) @@ -3255,7 +10516,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 472usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKey) ) @@ -3265,7 +10526,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 480usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKeyPair) ) @@ -3275,7 +10536,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 488usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WrapKey) ) @@ -3285,7 +10546,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 496usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_UnwrapKey) ) @@ -3295,7 +10556,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 504usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DeriveKey) ) @@ -3305,7 +10566,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 512usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SeedRandom) ) @@ -3315,7 +10576,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 520usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateRandom) ) @@ -3325,7 +10586,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 528usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionStatus) ) @@ -3335,7 +10596,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 536usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CancelFunction) ) @@ -3345,704 +10606,716 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 544usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WaitForSlotEvent) ) ); } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -#[test] -fn bindgen_test_layout__CK_C_INITIALIZE_ARGS() { - const UNINIT: ::std::mem::MaybeUninit<_CK_C_INITIALIZE_ARGS> = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_C_INITIALIZE_ARGS>(), - 48usize, - concat!("Size of: ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_C_INITIALIZE_ARGS>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(CreateMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, - 8usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(DestroyMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, - 16usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(LockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, - 24usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(UnlockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 32usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(flags) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, - 40usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(pReserved) - ) - ); -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], -} -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, + ::libloading::Error, + >, + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -4064,7 +11337,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -4125,6 +11397,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -4134,7 +11431,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -4195,872 +11491,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/bindings/arm-unknown-linux-gnueabi.rs b/cryptoki-sys/src/bindings/arm-unknown-linux-gnueabi.rs index b688e710..4ebdf675 100644 --- a/cryptoki-sys/src/bindings/arm-unknown-linux-gnueabi.rs +++ b/cryptoki-sys/src/bindings/arm-unknown-linux-gnueabi.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,211 +894,407 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_VERSION() { - const UNINIT: ::std::mem::MaybeUninit<_CK_VERSION> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_ATTRIBUTE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_VERSION>(), - 2usize, - concat!("Size of: ", stringify!(_CK_VERSION)) + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - ::std::mem::align_of::<_CK_VERSION>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_VERSION)) + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(major) + stringify!(type_) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, - 1usize, + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(minor) + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ATTRIBUTE), + "::", + stringify!(ulValueLen) ) ); } +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, + pub pReserved: *mut ::std::os::raw::c_void, } #[test] -fn bindgen_test_layout__CK_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_C_INITIALIZE_ARGS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_INFO>(), - 76usize, - concat!("Size of: ", stringify!(_CK_INFO)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - ::std::mem::align_of::<_CK_INFO>(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(_CK_INFO)) + concat!("Alignment of ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(cryptokiVersion) + stringify!(CreateMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 2usize, + unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(manufacturerID) + stringify!(DestroyMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 36usize, + unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(flags) + stringify!(LockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, - 40usize, + unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, + 12usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryDescription) + stringify!(UnlockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, - 72usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryVersion) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_C_INITIALIZE_ARGS), + "::", + stringify!(pReserved) ) ); } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], } #[test] -fn bindgen_test_layout__CK_SLOT_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SLOT_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_DATE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SLOT_INFO>(), - 104usize, - concat!("Size of: ", stringify!(_CK_SLOT_INFO)) + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_DATE)) ); assert_eq!( - ::std::mem::align_of::<_CK_SLOT_INFO>(), - 4usize, - concat!("Alignment of ", stringify!(_CK_SLOT_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_DATE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(slotDescription) + stringify!(year) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 64usize, + unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(manufacturerID) + stringify!(month) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, + 6usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(flags) + stringify!(day) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_DERIVED_KEY() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 100usize, + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTemplate) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(hardwareVersion) + stringify!(pTemplate) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 102usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAttributeCount) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(firmwareVersion) + stringify!(ulAttributeCount) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DERIVED_KEY), + "::", + stringify!(phKey) ) ); } -impl Default for _CK_SLOT_INFO { +impl Default for CK_DERIVED_KEY { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -888,258 +1303,323 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, } #[test] -fn bindgen_test_layout__CK_TOKEN_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_TOKEN_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_VERSION() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_TOKEN_INFO>(), - 160usize, - concat!("Size of: ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::size_of::(), + 2usize, + concat!("Size of: ", stringify!(CK_VERSION)) ); assert_eq!( - ::std::mem::align_of::<_CK_TOKEN_INFO>(), - 4usize, - concat!("Alignment of ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_VERSION)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(label) + stringify!(major) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, + 1usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(manufacturerID) + stringify!(minor) ) ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, - 64usize, + ::std::mem::size_of::(), + 76usize, + concat!("Size of: ", stringify!(CK_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(model) + stringify!(cryptokiVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 2usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(serialNumber) + stringify!(manufacturerID) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + 36usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, - 100usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulMaxSessionCount) + stringify!(libraryDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, - 104usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, + 72usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulSessionCount) + stringify!(libraryVersion) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_INTERFACE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, - 108usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulMaxRwSessionCount) - ) + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, - 112usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulRwSessionCount) - ) + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, - 116usize, + unsafe { ::std::ptr::addr_of!((*ptr).pInterfaceName) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMaxPinLen) + stringify!(pInterfaceName) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, - 120usize, + unsafe { ::std::ptr::addr_of!((*ptr).pFunctionList) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMinPinLen) + stringify!(pFunctionList) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, - 124usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulTotalPublicMemory) + stringify!(flags) ) ); +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, - 128usize, + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePublicMemory) + stringify!(mechanism) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, - 132usize, + unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulTotalPrivateMemory) + stringify!(pParameter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, - 136usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePrivateMemory) + stringify!(ulParameterLen) ) ); +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_MECHANISM_INFO)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 140usize, + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_MECHANISM_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(hardwareVersion) + stringify!(ulMinKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 142usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(firmwareVersion) + stringify!(ulMaxKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, - 144usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(utcTime) + stringify!(flags) ) ); } -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { +pub struct CK_SESSION_INFO { pub slotID: CK_SLOT_ID, pub state: CK_STATE, pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, + pub ulDeviceError: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_SESSION_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SESSION_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SESSION_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SESSION_INFO>(), + ::std::mem::size_of::(), 16usize, - concat!("Size of: ", stringify!(_CK_SESSION_INFO)) + concat!("Size of: ", stringify!(CK_SESSION_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_SESSION_INFO>(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(_CK_SESSION_INFO)) + concat!("Alignment of ", stringify!(CK_SESSION_INFO)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).slotID) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(slotID) ) @@ -1149,7 +1629,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 4usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(state) ) @@ -1159,7 +1639,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(flags) ) @@ -1169,71 +1649,87 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 12usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(ulDeviceError) ) ); } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, } #[test] -fn bindgen_test_layout__CK_ATTRIBUTE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_ATTRIBUTE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SLOT_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_ATTRIBUTE>(), - 12usize, - concat!("Size of: ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::size_of::(), + 104usize, + concat!("Size of: ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_ATTRIBUTE>(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(_CK_ATTRIBUTE)) + concat!("Alignment of ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(type_) + stringify!(slotDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(pValue) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(ulValueLen) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 100usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(hardwareVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 102usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(firmwareVersion) ) ); } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SLOT_INFO { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1244,464 +1740,499 @@ impl Default for _CK_ATTRIBUTE { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], } #[test] -fn bindgen_test_layout__CK_DATE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_DATE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_TOKEN_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_DATE>(), - 8usize, - concat!("Size of: ", stringify!(_CK_DATE)) + ::std::mem::size_of::(), + 160usize, + concat!("Size of: ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_DATE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_DATE)) + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(year) + stringify!(label) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(month) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, - 6usize, + unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(day) + stringify!(model) ) ); -} -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM>(), - 12usize, - concat!("Size of: ", stringify!(_CK_MECHANISM)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM>(), - 4usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM)) + unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(serialNumber) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(mechanism) + stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, + 100usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParameter) + stringify!(ulMaxSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulParameterLen) + stringify!(ulSessionCount) ) ); -} -impl Default for _CK_MECHANISM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM_INFO> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM_INFO>(), - 12usize, - concat!("Size of: ", stringify!(_CK_MECHANISM_INFO)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM_INFO>(), - 4usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM_INFO)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, + 108usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMinKeySize) + stringify!(ulMaxRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMaxKeySize) + stringify!(ulRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, + 116usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(flags) + stringify!(ulMaxPinLen) ) ); -} -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAM() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 12usize, - concat!("Size of: ", stringify!(CK_OTP_PARAM)) - ); - assert_eq!( - ::std::mem::align_of::(), - 4usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAM)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, + 120usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(type_) + stringify!(ulMinPinLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, + 124usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pValue) + stringify!(ulTotalPublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, + 128usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulValueLen) + stringify!(ulFreePublicMemory) ) ); -} -impl Default for CK_OTP_PARAM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAMS() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 8usize, - concat!("Size of: ", stringify!(CK_OTP_PARAMS)) - ); - assert_eq!( - ::std::mem::align_of::(), - 4usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, + 132usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(ulTotalPrivateMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, + 136usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(ulFreePrivateMemory) ) ); -} -impl Default for CK_OTP_PARAMS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 8usize, - concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) - ); assert_eq!( - ::std::mem::align_of::(), - 4usize, - concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 140usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(hardwareVersion) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 142usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(firmwareVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, + 144usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(utcTime) ) ); } -impl Default for CK_OTP_SIGNATURE_INFO { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_pss_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_AES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 12usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_pss_params)) + concat!("Alignment of ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(hashAlg) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(mgf) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 20usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(sLen) + stringify!(length) ) ); } -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_oaep_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 20usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_oaep_params)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_oaep_params)) + concat!("Alignment of ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(hashAlg) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 4usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(source) + stringify!(ulNonceLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, 12usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(pSourceData) + stringify!(pAAD) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(ulSourceDataLen) + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_AES_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_rsa_pkcs_oaep_params { +impl Default for CK_AES_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1712,30 +2243,30 @@ impl Default for ck_rsa_pkcs_oaep_params { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], } #[test] -fn bindgen_test_layout_ck_aes_ctr_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 20usize, - concat!("Size of: ", stringify!(ck_aes_ctr_params)) + concat!("Size of: ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_aes_ctr_params)) + concat!("Alignment of ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(ulCounterBits) ) @@ -1745,7 +2276,7 @@ fn bindgen_test_layout_ck_aes_ctr_params() { 4usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(cb) ) @@ -1753,34 +2284,34 @@ fn bindgen_test_layout_ck_aes_ctr_params() { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_gcm_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 24usize, - concat!("Size of: ", stringify!(ck_gcm_params)) + concat!("Size of: ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_gcm_params)) + concat!("Alignment of ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pIv) ) @@ -1790,7 +2321,7 @@ fn bindgen_test_layout_ck_gcm_params() { 4usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvLen) ) @@ -1800,7 +2331,7 @@ fn bindgen_test_layout_ck_gcm_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvBits) ) @@ -1810,7 +2341,7 @@ fn bindgen_test_layout_ck_gcm_params() { 12usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pAAD) ) @@ -1820,7 +2351,7 @@ fn bindgen_test_layout_ck_gcm_params() { 16usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulAADLen) ) @@ -1830,13 +2361,13 @@ fn bindgen_test_layout_ck_gcm_params() { 20usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulTagBits) ) ); } -impl Default for ck_gcm_params { +impl Default for CK_AES_GCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1845,83 +2376,125 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_ecdh1_derive_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_ARIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 20usize, - concat!("Size of: ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_ecdh1_derive_params)) + concat!("Alignment of ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(kdf) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulSharedDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 20usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pSharedData) + stringify!(length) ) ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, - 12usize, +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulPublicDataLen) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pPublicData) + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) ) ); } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1931,48 +2504,239 @@ impl Default for ck_ecdh1_derive_params { } } #[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(ulCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cb) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(cb) + ) + ); +} +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_key_derivation_string_data() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_CCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), + 28usize, + concat!("Size of: ", stringify!(CK_CCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_CCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 8usize, - concat!("Size of: ", stringify!(ck_key_derivation_string_data)) + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceFixedBits) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).nonceGenerator) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(nonceGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMAC) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pMAC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulMACLen) + ) + ); +} +impl Default for CK_CCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_key_derivation_string_data)) + concat!("Alignment of ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_PARAMS), "::", - stringify!(pData) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 4usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_PARAMS), "::", - stringify!(ulLen) + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_key_derivation_string_data { +impl Default for CK_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1983,58 +2747,68 @@ impl Default for ck_key_derivation_string_data { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_des_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CHACHA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 16usize, - concat!("Size of: ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Size of: ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(iv) + stringify!(pBlockCounter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).blockCounterBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_CHACHA20_PARAMS), + "::", + stringify!(blockCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, 12usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(length) + stringify!(ulNonceBits) ) ); } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_CHACHA20_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2045,58 +2819,112 @@ impl Default for ck_des_cbc_encrypt_data_params { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_aes_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CMS_SIG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_aes_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CMS_SIG_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CMS_SIG_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).certificateHandle) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CMS_SIG_PARAMS), "::", - stringify!(iv) + stringify!(certificateHandle) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pSigningMechanism) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pSigningMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDigestMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pDigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContentType) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pContentType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequestedAttributes) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CMS_SIG_PARAMS), "::", - stringify!(pData) + stringify!(pRequestedAttributes) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulRequestedAttributesLen) as usize - ptr as usize }, 20usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CMS_SIG_PARAMS), "::", - stringify!(length) + stringify!(ulRequestedAttributesLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequiredAttributes) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequiredAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequiredAttributesLen) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequiredAttributesLen) ) ); } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_CMS_SIG_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2105,478 +2933,6911 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_Initialize = - ::std::option::Option CK_RV>; -pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; -pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, ->; -pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismList = ::std::option::Option< +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DSA_PARAMETER_GEN_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(hash) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIndex) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulIndex) + ) + ); +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pSharedData) + ) + ); +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_ECMQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_EDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phFlag) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(phFlag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(ulContextDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(pContextData) + ) + ); +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvFixedBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ivGenerator) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ivGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pTag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pWrapOID) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pWrapOID) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWrapOIDLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulWrapOIDLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(hKey) + ) + ); +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_HKDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExtract) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExtract) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExpand) as usize - ptr as usize }, + 1usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExpand) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltType) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hSaltKey) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(hSaltKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulInfoLen) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulInfoLen) + ) + ); +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_KEA_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).isSender) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(isSender) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomA) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomB) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomB) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_DERIVATION_STRING_DATA() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(ulLen) + ) + ); +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_WRAP_SET_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bBC) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(bBC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pX) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(pX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulXLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(ulXLen) + ) + ); +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KIP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PBE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitVector) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pInitVector) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIteration) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulIteration) + ) + ); +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS2() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PRF_DATA_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[test] +fn bindgen_test_layout_CK_RC2_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(iv) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC2_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulRounds) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +#[test] +fn bindgen_test_layout_CK_RSA_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOAEPParams) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pOAEPParams) + ) + ); +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(source) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(pSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(ulSourceDataLen) + ) + ); +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_PSS_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(sLen) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!( + "Size of: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pTag) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pBlockCounter) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(ulNonceBits) + ) + ); +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SEED_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_PRIVATE_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 44usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPAndGLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPAndGLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulQLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulQLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRandomA) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrimeP) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPrimeP) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBaseG) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pBaseG) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSubprimeQ) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pSubprimeQ) + ) + ); +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_RELAYX_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldWrappedXLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldWrappedXLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldWrappedX) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldWrappedX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPasswordLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPassword) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPublicData) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldRandomA) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPasswordLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPassword) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPublicDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPublicData) as usize - ptr as usize }, + 44usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewRandomA) as usize - ptr as usize }, + 52usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewRandomA) + ) + ); +} +impl Default for CK_SKIPJACK_RELAYX_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_COUNTER_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_DKM_LENGTH_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).dkmLengthMethod) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(dkmLengthMethod) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_FEEDBACK_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 28usize, + concat!("Size of: ", stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulIVLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pIV) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_INITIALIZE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_prekey) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_prekey) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).initiator_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(initiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_INITIATE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 28usize, + concat!("Size of: ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_identity) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_signature) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPrekey_signature) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_key) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOnetime_key) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_identity) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_ephemeral) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_ephemeral) + ) + ); +} +impl Default for CK_X3DH_INITIATE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIdentity_id) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pIdentity_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_id) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pPrekey_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_id) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pOnetime_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_ephemeral) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_ephemeral) + ) + ); +} +impl Default for CK_X3DH_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_MQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).OtherInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(OtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData2) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, +} +#[test] +fn bindgen_test_layout_CK_XEDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 4usize, + concat!("Size of: ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_XEDDSA_PARAMS), + "::", + stringify!(hash) + ) + ); +} +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerMacSecret) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerKey) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVClient) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVClient) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVServer) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVServer) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SSL3_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_SSL3_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(prfMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulLabelLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pContextData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLength) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulContextDataLength) + ) + ); +} +impl Default for CK_TLS_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_MAC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerOrClient) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulServerOrClient) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_TLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(pIV) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 44usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSequenceNumber) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulSequenceNumber) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 28usize, + concat!("Size of: ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_WTLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +pub type CK_C_Initialize = + ::std::option::Option CK_RV>; +pub type CK_C_Finalize = + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; +pub type CK_C_GetSlotList = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; +pub type CK_C_GetTokenInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, +>; +pub type CK_C_GetMechanismList = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GetMechanismInfo = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, >; pub type CK_C_InitToken = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, >; pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SetPIN = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_OpenSession = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, >; pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, >; pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SetOperationState = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Login = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_Logout = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_CreateObject = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_CopyObject = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_GetObjectSize = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GetAttributeValue = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_SetAttributeValue = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_FindObjects = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Sign = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SignFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SignRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Verify = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_VerifyRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptDigestUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_UnwrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DeriveKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; +pub type CK_C_LoginUser = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, +} +#[test] +fn bindgen_test_layout_CK_FUNCTION_LIST_3_0() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 372usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(version) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Initialize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Finalize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetTokenInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitToken) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, + 44usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, + 52usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_OpenSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, + 60usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseAllSessions) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSessionInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, + 68usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, + 76usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Login) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Logout) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, + 84usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CreateObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CopyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, + 92usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DestroyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetObjectSize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, + 100usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, + 108usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, + 112usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjects) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, + 116usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, + 124usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Encrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, + 128usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, + 132usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, + 140usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Decrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, + 144usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, + 148usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, + 152usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, + 156usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Digest) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, + 160usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, + 164usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, + 168usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, + 172usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, + 176usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Sign) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, + 180usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, + 188usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, + 192usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, + 196usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, + 200usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Verify) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, + 204usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, + 208usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, + 212usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, + 216usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, + 220usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, + 224usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptDigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, + 228usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, + 232usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptVerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, + 236usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, + 240usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKeyPair) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, + 244usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, + 248usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_UnwrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, + 252usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DeriveKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, + 256usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SeedRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, + 260usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, + 264usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionStatus) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, + 268usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CancelFunction) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, + 272usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WaitForSlotEvent) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterfaceList) as usize - ptr as usize }, + 276usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterfaceList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterface) as usize - ptr as usize }, + 280usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterface) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_LoginUser) as usize - ptr as usize }, + 284usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_LoginUser) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SessionCancel) as usize - ptr as usize }, + 288usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SessionCancel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptInit) as usize - ptr as usize }, + 292usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessage) as usize - ptr as usize }, + 296usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageBegin) as usize - ptr as usize }, + 300usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageNext) as usize - ptr as usize }, + 304usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptFinal) as usize - ptr as usize }, + 308usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptInit) as usize - ptr as usize }, + 312usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessage) as usize - ptr as usize }, + 316usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageBegin) as usize - ptr as usize }, + 320usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageNext) as usize - ptr as usize }, + 324usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptFinal) as usize - ptr as usize }, + 328usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignInit) as usize - ptr as usize }, + 332usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessage) as usize - ptr as usize }, + 336usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageBegin) as usize - ptr as usize }, + 340usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageNext) as usize - ptr as usize }, + 344usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignFinal) as usize - ptr as usize }, + 348usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyInit) as usize - ptr as usize }, + 352usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessage) as usize - ptr as usize }, + 356usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageBegin) as usize - ptr as usize }, + 360usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageNext) as usize - ptr as usize }, + 364usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyFinal) as usize - ptr as usize }, + 368usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyFinal) + ) + ); +} #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -2647,25 +9908,25 @@ pub struct _CK_FUNCTION_LIST { pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } #[test] -fn bindgen_test_layout__CK_FUNCTION_LIST() { - const UNINIT: ::std::mem::MaybeUninit<_CK_FUNCTION_LIST> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_FUNCTION_LIST() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_FUNCTION_LIST>(), + ::std::mem::size_of::(), 276usize, - concat!("Size of: ", stringify!(_CK_FUNCTION_LIST)) + concat!("Size of: ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( - ::std::mem::align_of::<_CK_FUNCTION_LIST>(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(_CK_FUNCTION_LIST)) + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(version) ) @@ -2675,7 +9936,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 4usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Initialize) ) @@ -2685,7 +9946,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Finalize) ) @@ -2695,7 +9956,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 12usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetInfo) ) @@ -2705,7 +9966,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionList) ) @@ -2715,7 +9976,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 20usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotList) ) @@ -2725,7 +9986,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotInfo) ) @@ -2735,7 +9996,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 28usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetTokenInfo) ) @@ -2745,7 +10006,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 32usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismList) ) @@ -2755,7 +10016,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 36usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismInfo) ) @@ -2765,7 +10026,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 40usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitToken) ) @@ -2775,7 +10036,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 44usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitPIN) ) @@ -2785,7 +10046,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 48usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetPIN) ) @@ -2795,7 +10056,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 52usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_OpenSession) ) @@ -2805,7 +10066,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 56usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseSession) ) @@ -2815,7 +10076,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 60usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseAllSessions) ) @@ -2825,7 +10086,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 64usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSessionInfo) ) @@ -2835,7 +10096,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 68usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetOperationState) ) @@ -2845,7 +10106,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 72usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetOperationState) ) @@ -2855,7 +10116,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 76usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Login) ) @@ -2865,7 +10126,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 80usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Logout) ) @@ -2875,7 +10136,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 84usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CreateObject) ) @@ -2885,7 +10146,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 88usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CopyObject) ) @@ -2895,7 +10156,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 92usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DestroyObject) ) @@ -2905,7 +10166,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 96usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetObjectSize) ) @@ -2915,7 +10176,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 100usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetAttributeValue) ) @@ -2925,7 +10186,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 104usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetAttributeValue) ) @@ -2935,7 +10196,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 108usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsInit) ) @@ -2945,7 +10206,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 112usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjects) ) @@ -2955,7 +10216,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 116usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsFinal) ) @@ -2965,7 +10226,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 120usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptInit) ) @@ -2975,7 +10236,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 124usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Encrypt) ) @@ -2985,7 +10246,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 128usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptUpdate) ) @@ -2995,7 +10256,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 132usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptFinal) ) @@ -3005,7 +10266,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 136usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptInit) ) @@ -3015,7 +10276,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 140usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Decrypt) ) @@ -3025,7 +10286,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 144usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptUpdate) ) @@ -3035,7 +10296,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 148usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptFinal) ) @@ -3045,7 +10306,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 152usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestInit) ) @@ -3055,7 +10316,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 156usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Digest) ) @@ -3065,7 +10326,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 160usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestUpdate) ) @@ -3075,7 +10336,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 164usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestKey) ) @@ -3085,7 +10346,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 168usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestFinal) ) @@ -3095,7 +10356,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 172usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignInit) ) @@ -3105,7 +10366,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 176usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Sign) ) @@ -3115,7 +10376,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 180usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignUpdate) ) @@ -3125,7 +10386,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 184usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignFinal) ) @@ -3135,7 +10396,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 188usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecoverInit) ) @@ -3145,7 +10406,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 192usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecover) ) @@ -3155,7 +10416,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 196usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyInit) ) @@ -3165,7 +10426,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 200usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Verify) ) @@ -3175,7 +10436,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 204usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyUpdate) ) @@ -3185,7 +10446,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 208usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyFinal) ) @@ -3195,7 +10456,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 212usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecoverInit) ) @@ -3205,7 +10466,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 216usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecover) ) @@ -3215,7 +10476,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 220usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestEncryptUpdate) ) @@ -3225,7 +10486,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 224usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptDigestUpdate) ) @@ -3235,7 +10496,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 228usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignEncryptUpdate) ) @@ -3245,7 +10506,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 232usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptVerifyUpdate) ) @@ -3255,7 +10516,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 236usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKey) ) @@ -3265,7 +10526,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 240usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKeyPair) ) @@ -3275,7 +10536,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 244usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WrapKey) ) @@ -3285,7 +10546,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 248usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_UnwrapKey) ) @@ -3295,7 +10556,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 252usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DeriveKey) ) @@ -3305,7 +10566,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 256usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SeedRandom) ) @@ -3315,7 +10576,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 260usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateRandom) ) @@ -3325,7 +10586,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 264usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionStatus) ) @@ -3335,7 +10596,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 268usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CancelFunction) ) @@ -3345,704 +10606,716 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 272usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WaitForSlotEvent) ) ); } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -#[test] -fn bindgen_test_layout__CK_C_INITIALIZE_ARGS() { - const UNINIT: ::std::mem::MaybeUninit<_CK_C_INITIALIZE_ARGS> = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_C_INITIALIZE_ARGS>(), - 24usize, - concat!("Size of: ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_C_INITIALIZE_ARGS>(), - 4usize, - concat!("Alignment of ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(CreateMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, - 4usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(DestroyMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, - 8usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(LockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, - 12usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(UnlockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 16usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(flags) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, - 20usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(pReserved) - ) - ); -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], -} -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, + ::libloading::Error, + >, + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -4064,7 +11337,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -4125,6 +11397,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -4134,7 +11431,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -4195,872 +11491,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/bindings/generic.rs b/cryptoki-sys/src/bindings/generic.rs index e7b388c9..cd35d46b 100644 --- a/cryptoki-sys/src/bindings/generic.rs +++ b/cryptoki-sys/src/bindings/generic.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,48 +894,1219 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, + pub flags: CK_FLAGS, + pub pReserved: *mut ::std::os::raw::c_void, +} +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +impl Default for CK_DERIVED_KEY { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SESSION_INFO { + pub slotID: CK_SLOT_ID, + pub state: CK_STATE, + pub flags: CK_FLAGS, + pub ulDeviceError: CK_ULONG, +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, +} +impl Default for CK_SLOT_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], +} +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], +} +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, +} +impl Default for CK_AES_CCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +impl Default for CK_AES_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, +} +impl Default for CK_CCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, +} +impl Default for CK_CCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +impl Default for CK_CHACHA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, +} +impl Default for CK_CMS_SIG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } } #[repr(C)] -#[cfg_attr(windows, repr(packed))] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, } -impl Default for _CK_SLOT_INFO { +impl Default for CK_SKIPJACK_RELAYX_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -725,60 +2115,32 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], -} -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; -#[repr(C)] -#[cfg_attr(windows, repr(packed))] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { - pub slotID: CK_SLOT_ID, - pub state: CK_STATE, - pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -788,22 +2150,36 @@ impl Default for _CK_ATTRIBUTE { } } #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } } -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, } -impl Default for _CK_MECHANISM { +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -813,23 +2189,38 @@ impl Default for _CK_MECHANISM { } } #[repr(C)] -#[cfg_attr(windows, repr(packed))] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } } -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, } -impl Default for CK_OTP_PARAM { +impl Default for CK_X3DH_INITIATE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -839,13 +2230,16 @@ impl Default for CK_OTP_PARAM { } } #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, } -impl Default for CK_OTP_PARAMS { +impl Default for CK_X3DH_RESPOND_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -855,13 +2249,60 @@ impl Default for CK_OTP_PARAMS { } } #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, } -impl Default for CK_OTP_SIGNATURE_INFO { +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -870,27 +2311,120 @@ impl Default for CK_OTP_SIGNATURE_INFO { } } } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, } -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } } -impl Default for ck_rsa_pkcs_oaep_params { +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +impl Default for CK_TLS_KDF_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -900,24 +2434,23 @@ impl Default for ck_rsa_pkcs_oaep_params { } } #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, } #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, } -impl Default for ck_gcm_params { +impl Default for CK_TLS_PRF_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -926,18 +2459,18 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_TLS12_KEY_MAT_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -947,13 +2480,13 @@ impl Default for ck_ecdh1_derive_params { } } #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, } -impl Default for ck_key_derivation_string_data { +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -963,14 +2496,13 @@ impl Default for ck_key_derivation_string_data { } } #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_WTLS_KEY_MAT_OUT { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -980,14 +2512,71 @@ impl Default for ck_des_cbc_encrypt_data_params { } } #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +impl Default for CK_WTLS_PRF_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -996,479 +2585,597 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; pub type CK_C_Initialize = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, >; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, >; pub type CK_C_GetMechanismList = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GetMechanismInfo = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, >; pub type CK_C_InitToken = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, >; pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SetPIN = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_OpenSession = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, >; pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, >; pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SetOperationState = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Login = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_Logout = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_CreateObject = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_CopyObject = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_GetObjectSize = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GetAttributeValue = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_SetAttributeValue = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_FindObjects = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_SignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_Sign = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignUpdate = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_SignFinal = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_SignRecoverInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignRecover = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_Verify = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyUpdate = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_VerifyFinal = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_VerifyRecoverInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_VerifyRecover = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DigestEncryptUpdate = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptDigestUpdate = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignEncryptUpdate = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; -pub type CK_C_SignInit = ::std::option::Option< +pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; -pub type CK_C_Sign = ::std::option::Option< +pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, >; -pub type CK_C_SignUpdate = ::std::option::Option< +pub type CK_C_UnwrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; -pub type CK_C_SignFinal = ::std::option::Option< +pub type CK_C_DeriveKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; -pub type CK_C_SignRecoverInit = ::std::option::Option< +pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, >; -pub type CK_C_SignRecover = ::std::option::Option< +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_VerifyInit = ::std::option::Option< +pub type CK_C_LoginUser = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, >; -pub type CK_C_Verify = ::std::option::Option< +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; -pub type CK_C_VerifyUpdate = ::std::option::Option< +pub type CK_C_EncryptMessage = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, >; -pub type CK_C_VerifyFinal = ::std::option::Option< +pub type CK_C_EncryptMessageBegin = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; -pub type CK_C_VerifyRecoverInit = ::std::option::Option< +pub type CK_C_EncryptMessageNext = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_VerifyRecover = ::std::option::Option< +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; -pub type CK_C_DigestEncryptUpdate = ::std::option::Option< +pub type CK_C_DecryptMessage = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, >; -pub type CK_C_DecryptDigestUpdate = ::std::option::Option< +pub type CK_C_DecryptMessageBegin = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; -pub type CK_C_SignEncryptUpdate = ::std::option::Option< +pub type CK_C_DecryptMessageNext = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; -pub type CK_C_GenerateKey = ::std::option::Option< +pub type CK_C_SignMessage = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, >; -pub type CK_C_GenerateKeyPair = ::std::option::Option< +pub type CK_C_SignMessageBegin = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, >; -pub type CK_C_WrapKey = ::std::option::Option< +pub type CK_C_SignMessageNext = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, >; -pub type CK_C_UnwrapKey = ::std::option::Option< +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; -pub type CK_C_DeriveKey = ::std::option::Option< +pub type CK_C_VerifyMessage = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, >; -pub type CK_C_SeedRandom = ::std::option::Option< +pub type CK_C_VerifyMessageBegin = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_VerifyMessageNext = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; #[repr(C)] -#[cfg_attr(windows, repr(packed))] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -1537,624 +3244,808 @@ pub struct _CK_FUNCTION_LIST { pub C_GetFunctionStatus: CK_C_GetFunctionStatus, pub C_CancelFunction: CK_C_CancelFunction, pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C)] -#[cfg_attr(windows, repr(packed))] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; #[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -2176,7 +4067,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -2237,6 +4127,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -2246,7 +4161,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -2307,872 +4221,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV { + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/bindings/i686-unknown-linux-gnu.rs b/cryptoki-sys/src/bindings/i686-unknown-linux-gnu.rs index b688e710..4ebdf675 100644 --- a/cryptoki-sys/src/bindings/i686-unknown-linux-gnu.rs +++ b/cryptoki-sys/src/bindings/i686-unknown-linux-gnu.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,211 +894,407 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_VERSION() { - const UNINIT: ::std::mem::MaybeUninit<_CK_VERSION> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_ATTRIBUTE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_VERSION>(), - 2usize, - concat!("Size of: ", stringify!(_CK_VERSION)) + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - ::std::mem::align_of::<_CK_VERSION>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_VERSION)) + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(major) + stringify!(type_) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, - 1usize, + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(minor) + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ATTRIBUTE), + "::", + stringify!(ulValueLen) ) ); } +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, + pub pReserved: *mut ::std::os::raw::c_void, } #[test] -fn bindgen_test_layout__CK_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_C_INITIALIZE_ARGS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_INFO>(), - 76usize, - concat!("Size of: ", stringify!(_CK_INFO)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - ::std::mem::align_of::<_CK_INFO>(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(_CK_INFO)) + concat!("Alignment of ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(cryptokiVersion) + stringify!(CreateMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 2usize, + unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(manufacturerID) + stringify!(DestroyMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 36usize, + unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(flags) + stringify!(LockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, - 40usize, + unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, + 12usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryDescription) + stringify!(UnlockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, - 72usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryVersion) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_C_INITIALIZE_ARGS), + "::", + stringify!(pReserved) ) ); } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], } #[test] -fn bindgen_test_layout__CK_SLOT_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SLOT_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_DATE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SLOT_INFO>(), - 104usize, - concat!("Size of: ", stringify!(_CK_SLOT_INFO)) + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_DATE)) ); assert_eq!( - ::std::mem::align_of::<_CK_SLOT_INFO>(), - 4usize, - concat!("Alignment of ", stringify!(_CK_SLOT_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_DATE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(slotDescription) + stringify!(year) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 64usize, + unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(manufacturerID) + stringify!(month) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, + 6usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(flags) + stringify!(day) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_DERIVED_KEY() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 100usize, + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTemplate) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(hardwareVersion) + stringify!(pTemplate) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 102usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAttributeCount) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(firmwareVersion) + stringify!(ulAttributeCount) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DERIVED_KEY), + "::", + stringify!(phKey) ) ); } -impl Default for _CK_SLOT_INFO { +impl Default for CK_DERIVED_KEY { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -888,258 +1303,323 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, } #[test] -fn bindgen_test_layout__CK_TOKEN_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_TOKEN_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_VERSION() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_TOKEN_INFO>(), - 160usize, - concat!("Size of: ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::size_of::(), + 2usize, + concat!("Size of: ", stringify!(CK_VERSION)) ); assert_eq!( - ::std::mem::align_of::<_CK_TOKEN_INFO>(), - 4usize, - concat!("Alignment of ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_VERSION)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(label) + stringify!(major) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, + 1usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(manufacturerID) + stringify!(minor) ) ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, - 64usize, + ::std::mem::size_of::(), + 76usize, + concat!("Size of: ", stringify!(CK_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(model) + stringify!(cryptokiVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 2usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(serialNumber) + stringify!(manufacturerID) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + 36usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, - 100usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulMaxSessionCount) + stringify!(libraryDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, - 104usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, + 72usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulSessionCount) + stringify!(libraryVersion) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_INTERFACE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, - 108usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulMaxRwSessionCount) - ) + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, - 112usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulRwSessionCount) - ) + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, - 116usize, + unsafe { ::std::ptr::addr_of!((*ptr).pInterfaceName) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMaxPinLen) + stringify!(pInterfaceName) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, - 120usize, + unsafe { ::std::ptr::addr_of!((*ptr).pFunctionList) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMinPinLen) + stringify!(pFunctionList) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, - 124usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulTotalPublicMemory) + stringify!(flags) ) ); +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, - 128usize, + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePublicMemory) + stringify!(mechanism) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, - 132usize, + unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulTotalPrivateMemory) + stringify!(pParameter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, - 136usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePrivateMemory) + stringify!(ulParameterLen) ) ); +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_MECHANISM_INFO)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 140usize, + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_MECHANISM_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(hardwareVersion) + stringify!(ulMinKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 142usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(firmwareVersion) + stringify!(ulMaxKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, - 144usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(utcTime) + stringify!(flags) ) ); } -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { +pub struct CK_SESSION_INFO { pub slotID: CK_SLOT_ID, pub state: CK_STATE, pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, + pub ulDeviceError: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_SESSION_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SESSION_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SESSION_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SESSION_INFO>(), + ::std::mem::size_of::(), 16usize, - concat!("Size of: ", stringify!(_CK_SESSION_INFO)) + concat!("Size of: ", stringify!(CK_SESSION_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_SESSION_INFO>(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(_CK_SESSION_INFO)) + concat!("Alignment of ", stringify!(CK_SESSION_INFO)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).slotID) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(slotID) ) @@ -1149,7 +1629,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 4usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(state) ) @@ -1159,7 +1639,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(flags) ) @@ -1169,71 +1649,87 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 12usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(ulDeviceError) ) ); } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, } #[test] -fn bindgen_test_layout__CK_ATTRIBUTE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_ATTRIBUTE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SLOT_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_ATTRIBUTE>(), - 12usize, - concat!("Size of: ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::size_of::(), + 104usize, + concat!("Size of: ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_ATTRIBUTE>(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(_CK_ATTRIBUTE)) + concat!("Alignment of ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(type_) + stringify!(slotDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(pValue) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(ulValueLen) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 100usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(hardwareVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 102usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(firmwareVersion) ) ); } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SLOT_INFO { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1244,464 +1740,499 @@ impl Default for _CK_ATTRIBUTE { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], } #[test] -fn bindgen_test_layout__CK_DATE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_DATE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_TOKEN_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_DATE>(), - 8usize, - concat!("Size of: ", stringify!(_CK_DATE)) + ::std::mem::size_of::(), + 160usize, + concat!("Size of: ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_DATE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_DATE)) + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(year) + stringify!(label) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(month) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, - 6usize, + unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(day) + stringify!(model) ) ); -} -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM>(), - 12usize, - concat!("Size of: ", stringify!(_CK_MECHANISM)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM>(), - 4usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM)) + unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(serialNumber) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(mechanism) + stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, + 100usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParameter) + stringify!(ulMaxSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulParameterLen) + stringify!(ulSessionCount) ) ); -} -impl Default for _CK_MECHANISM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM_INFO> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM_INFO>(), - 12usize, - concat!("Size of: ", stringify!(_CK_MECHANISM_INFO)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM_INFO>(), - 4usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM_INFO)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, + 108usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMinKeySize) + stringify!(ulMaxRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMaxKeySize) + stringify!(ulRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, + 116usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(flags) + stringify!(ulMaxPinLen) ) ); -} -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAM() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 12usize, - concat!("Size of: ", stringify!(CK_OTP_PARAM)) - ); - assert_eq!( - ::std::mem::align_of::(), - 4usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAM)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, + 120usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(type_) + stringify!(ulMinPinLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, + 124usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pValue) + stringify!(ulTotalPublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, + 128usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulValueLen) + stringify!(ulFreePublicMemory) ) ); -} -impl Default for CK_OTP_PARAM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAMS() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 8usize, - concat!("Size of: ", stringify!(CK_OTP_PARAMS)) - ); - assert_eq!( - ::std::mem::align_of::(), - 4usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, + 132usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(ulTotalPrivateMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, + 136usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(ulFreePrivateMemory) ) ); -} -impl Default for CK_OTP_PARAMS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 8usize, - concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) - ); assert_eq!( - ::std::mem::align_of::(), - 4usize, - concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 140usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(hardwareVersion) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 142usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(firmwareVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, + 144usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(utcTime) ) ); } -impl Default for CK_OTP_SIGNATURE_INFO { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_pss_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_AES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 12usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_pss_params)) + concat!("Alignment of ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(hashAlg) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(mgf) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 20usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(sLen) + stringify!(length) ) ); } -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_oaep_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 20usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_oaep_params)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_oaep_params)) + concat!("Alignment of ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(hashAlg) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 4usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(source) + stringify!(ulNonceLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, 12usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(pSourceData) + stringify!(pAAD) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(ulSourceDataLen) + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_AES_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_rsa_pkcs_oaep_params { +impl Default for CK_AES_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1712,30 +2243,30 @@ impl Default for ck_rsa_pkcs_oaep_params { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], } #[test] -fn bindgen_test_layout_ck_aes_ctr_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 20usize, - concat!("Size of: ", stringify!(ck_aes_ctr_params)) + concat!("Size of: ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_aes_ctr_params)) + concat!("Alignment of ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(ulCounterBits) ) @@ -1745,7 +2276,7 @@ fn bindgen_test_layout_ck_aes_ctr_params() { 4usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(cb) ) @@ -1753,34 +2284,34 @@ fn bindgen_test_layout_ck_aes_ctr_params() { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_gcm_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 24usize, - concat!("Size of: ", stringify!(ck_gcm_params)) + concat!("Size of: ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_gcm_params)) + concat!("Alignment of ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pIv) ) @@ -1790,7 +2321,7 @@ fn bindgen_test_layout_ck_gcm_params() { 4usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvLen) ) @@ -1800,7 +2331,7 @@ fn bindgen_test_layout_ck_gcm_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvBits) ) @@ -1810,7 +2341,7 @@ fn bindgen_test_layout_ck_gcm_params() { 12usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pAAD) ) @@ -1820,7 +2351,7 @@ fn bindgen_test_layout_ck_gcm_params() { 16usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulAADLen) ) @@ -1830,13 +2361,13 @@ fn bindgen_test_layout_ck_gcm_params() { 20usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulTagBits) ) ); } -impl Default for ck_gcm_params { +impl Default for CK_AES_GCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1845,83 +2376,125 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_ecdh1_derive_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_ARIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 20usize, - concat!("Size of: ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_ecdh1_derive_params)) + concat!("Alignment of ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(kdf) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulSharedDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 20usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pSharedData) + stringify!(length) ) ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, - 12usize, +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulPublicDataLen) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pPublicData) + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) ) ); } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1931,48 +2504,239 @@ impl Default for ck_ecdh1_derive_params { } } #[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(ulCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cb) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(cb) + ) + ); +} +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_key_derivation_string_data() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_CCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), + 28usize, + concat!("Size of: ", stringify!(CK_CCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_CCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 8usize, - concat!("Size of: ", stringify!(ck_key_derivation_string_data)) + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceFixedBits) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).nonceGenerator) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(nonceGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMAC) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pMAC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulMACLen) + ) + ); +} +impl Default for CK_CCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_key_derivation_string_data)) + concat!("Alignment of ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_PARAMS), "::", - stringify!(pData) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 4usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_PARAMS), "::", - stringify!(ulLen) + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_key_derivation_string_data { +impl Default for CK_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1983,58 +2747,68 @@ impl Default for ck_key_derivation_string_data { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_des_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CHACHA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 16usize, - concat!("Size of: ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Size of: ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(iv) + stringify!(pBlockCounter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).blockCounterBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_CHACHA20_PARAMS), + "::", + stringify!(blockCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, 12usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(length) + stringify!(ulNonceBits) ) ); } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_CHACHA20_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2045,58 +2819,112 @@ impl Default for ck_des_cbc_encrypt_data_params { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_aes_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CMS_SIG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_aes_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CMS_SIG_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CMS_SIG_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).certificateHandle) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CMS_SIG_PARAMS), "::", - stringify!(iv) + stringify!(certificateHandle) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pSigningMechanism) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pSigningMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDigestMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pDigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContentType) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pContentType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequestedAttributes) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CMS_SIG_PARAMS), "::", - stringify!(pData) + stringify!(pRequestedAttributes) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulRequestedAttributesLen) as usize - ptr as usize }, 20usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CMS_SIG_PARAMS), "::", - stringify!(length) + stringify!(ulRequestedAttributesLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequiredAttributes) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequiredAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequiredAttributesLen) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequiredAttributesLen) ) ); } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_CMS_SIG_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2105,478 +2933,6911 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_Initialize = - ::std::option::Option CK_RV>; -pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; -pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, ->; -pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismList = ::std::option::Option< +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DSA_PARAMETER_GEN_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(hash) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIndex) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulIndex) + ) + ); +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pSharedData) + ) + ); +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_ECMQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_EDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phFlag) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(phFlag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(ulContextDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(pContextData) + ) + ); +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvFixedBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ivGenerator) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ivGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pTag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pWrapOID) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pWrapOID) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWrapOIDLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulWrapOIDLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(hKey) + ) + ); +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_HKDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExtract) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExtract) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExpand) as usize - ptr as usize }, + 1usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExpand) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltType) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hSaltKey) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(hSaltKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulInfoLen) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulInfoLen) + ) + ); +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_KEA_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).isSender) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(isSender) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomA) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomB) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomB) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_DERIVATION_STRING_DATA() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(ulLen) + ) + ); +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_WRAP_SET_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bBC) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(bBC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pX) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(pX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulXLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(ulXLen) + ) + ); +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KIP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PBE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitVector) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pInitVector) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIteration) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulIteration) + ) + ); +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS2() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PRF_DATA_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[test] +fn bindgen_test_layout_CK_RC2_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(iv) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC2_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulRounds) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +#[test] +fn bindgen_test_layout_CK_RSA_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOAEPParams) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pOAEPParams) + ) + ); +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(source) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(pSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(ulSourceDataLen) + ) + ); +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_PSS_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(sLen) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!( + "Size of: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pTag) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pBlockCounter) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(ulNonceBits) + ) + ); +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SEED_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_PRIVATE_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 44usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPAndGLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPAndGLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulQLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulQLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRandomA) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrimeP) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPrimeP) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBaseG) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pBaseG) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSubprimeQ) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pSubprimeQ) + ) + ); +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_RELAYX_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldWrappedXLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldWrappedXLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldWrappedX) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldWrappedX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPasswordLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPassword) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPublicData) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldRandomA) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPasswordLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPassword) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPublicDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPublicData) as usize - ptr as usize }, + 44usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewRandomA) as usize - ptr as usize }, + 52usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewRandomA) + ) + ); +} +impl Default for CK_SKIPJACK_RELAYX_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_COUNTER_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_DKM_LENGTH_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).dkmLengthMethod) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(dkmLengthMethod) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_FEEDBACK_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 28usize, + concat!("Size of: ", stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulIVLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pIV) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_INITIALIZE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_prekey) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_prekey) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).initiator_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(initiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_INITIATE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 28usize, + concat!("Size of: ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_identity) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_signature) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPrekey_signature) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_key) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOnetime_key) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_identity) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_ephemeral) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_ephemeral) + ) + ); +} +impl Default for CK_X3DH_INITIATE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIdentity_id) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pIdentity_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_id) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pPrekey_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_id) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pOnetime_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_ephemeral) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_ephemeral) + ) + ); +} +impl Default for CK_X3DH_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_MQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).OtherInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(OtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData2) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, +} +#[test] +fn bindgen_test_layout_CK_XEDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 4usize, + concat!("Size of: ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_XEDDSA_PARAMS), + "::", + stringify!(hash) + ) + ); +} +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerMacSecret) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerKey) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVClient) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVClient) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVServer) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVServer) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SSL3_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_SSL3_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 36usize, + concat!("Size of: ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(prfMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulLabelLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pContextData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLength) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulContextDataLength) + ) + ); +} +impl Default for CK_TLS_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_MAC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerOrClient) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulServerOrClient) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_TLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(pIV) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 44usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSequenceNumber) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulSequenceNumber) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!( + "Alignment of ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 28usize, + concat!("Size of: ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_WTLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +pub type CK_C_Initialize = + ::std::option::Option CK_RV>; +pub type CK_C_Finalize = + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; +pub type CK_C_GetSlotList = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; +pub type CK_C_GetTokenInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, +>; +pub type CK_C_GetMechanismList = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GetMechanismInfo = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, >; pub type CK_C_InitToken = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, >; pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SetPIN = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_OpenSession = ::std::option::Option< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, >; pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, >; pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SetOperationState = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Login = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_Logout = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_CreateObject = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_CopyObject = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_GetObjectSize = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GetAttributeValue = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_SetAttributeValue = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_FindObjects = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Sign = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SignFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SignRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Verify = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_VerifyRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptDigestUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_UnwrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DeriveKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; +pub type CK_C_LoginUser = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, +} +#[test] +fn bindgen_test_layout_CK_FUNCTION_LIST_3_0() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 372usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(version) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Initialize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Finalize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetTokenInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitToken) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, + 44usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, + 52usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_OpenSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, + 60usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseAllSessions) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSessionInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, + 68usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, + 76usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Login) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Logout) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, + 84usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CreateObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CopyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, + 92usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DestroyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetObjectSize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, + 100usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, + 108usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, + 112usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjects) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, + 116usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, + 124usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Encrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, + 128usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, + 132usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, + 140usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Decrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, + 144usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, + 148usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, + 152usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, + 156usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Digest) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, + 160usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, + 164usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, + 168usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, + 172usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, + 176usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Sign) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, + 180usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, + 188usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, + 192usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, + 196usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, + 200usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Verify) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, + 204usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, + 208usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, + 212usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, + 216usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, + 220usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, + 224usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptDigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, + 228usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, + 232usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptVerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, + 236usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, + 240usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKeyPair) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, + 244usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, + 248usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_UnwrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, + 252usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DeriveKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, + 256usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SeedRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, + 260usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, + 264usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionStatus) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, + 268usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CancelFunction) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, + 272usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WaitForSlotEvent) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterfaceList) as usize - ptr as usize }, + 276usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterfaceList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterface) as usize - ptr as usize }, + 280usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterface) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_LoginUser) as usize - ptr as usize }, + 284usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_LoginUser) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SessionCancel) as usize - ptr as usize }, + 288usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SessionCancel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptInit) as usize - ptr as usize }, + 292usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessage) as usize - ptr as usize }, + 296usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageBegin) as usize - ptr as usize }, + 300usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageNext) as usize - ptr as usize }, + 304usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptFinal) as usize - ptr as usize }, + 308usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptInit) as usize - ptr as usize }, + 312usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessage) as usize - ptr as usize }, + 316usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageBegin) as usize - ptr as usize }, + 320usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageNext) as usize - ptr as usize }, + 324usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptFinal) as usize - ptr as usize }, + 328usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignInit) as usize - ptr as usize }, + 332usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessage) as usize - ptr as usize }, + 336usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageBegin) as usize - ptr as usize }, + 340usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageNext) as usize - ptr as usize }, + 344usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignFinal) as usize - ptr as usize }, + 348usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyInit) as usize - ptr as usize }, + 352usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessage) as usize - ptr as usize }, + 356usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageBegin) as usize - ptr as usize }, + 360usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageNext) as usize - ptr as usize }, + 364usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyFinal) as usize - ptr as usize }, + 368usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyFinal) + ) + ); +} #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -2647,25 +9908,25 @@ pub struct _CK_FUNCTION_LIST { pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } #[test] -fn bindgen_test_layout__CK_FUNCTION_LIST() { - const UNINIT: ::std::mem::MaybeUninit<_CK_FUNCTION_LIST> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_FUNCTION_LIST() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_FUNCTION_LIST>(), + ::std::mem::size_of::(), 276usize, - concat!("Size of: ", stringify!(_CK_FUNCTION_LIST)) + concat!("Size of: ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( - ::std::mem::align_of::<_CK_FUNCTION_LIST>(), + ::std::mem::align_of::(), 4usize, - concat!("Alignment of ", stringify!(_CK_FUNCTION_LIST)) + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(version) ) @@ -2675,7 +9936,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 4usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Initialize) ) @@ -2685,7 +9946,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Finalize) ) @@ -2695,7 +9956,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 12usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetInfo) ) @@ -2705,7 +9966,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionList) ) @@ -2715,7 +9976,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 20usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotList) ) @@ -2725,7 +9986,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotInfo) ) @@ -2735,7 +9996,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 28usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetTokenInfo) ) @@ -2745,7 +10006,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 32usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismList) ) @@ -2755,7 +10016,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 36usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismInfo) ) @@ -2765,7 +10026,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 40usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitToken) ) @@ -2775,7 +10036,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 44usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitPIN) ) @@ -2785,7 +10046,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 48usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetPIN) ) @@ -2795,7 +10056,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 52usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_OpenSession) ) @@ -2805,7 +10066,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 56usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseSession) ) @@ -2815,7 +10076,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 60usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseAllSessions) ) @@ -2825,7 +10086,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 64usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSessionInfo) ) @@ -2835,7 +10096,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 68usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetOperationState) ) @@ -2845,7 +10106,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 72usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetOperationState) ) @@ -2855,7 +10116,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 76usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Login) ) @@ -2865,7 +10126,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 80usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Logout) ) @@ -2875,7 +10136,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 84usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CreateObject) ) @@ -2885,7 +10146,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 88usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CopyObject) ) @@ -2895,7 +10156,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 92usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DestroyObject) ) @@ -2905,7 +10166,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 96usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetObjectSize) ) @@ -2915,7 +10176,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 100usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetAttributeValue) ) @@ -2925,7 +10186,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 104usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetAttributeValue) ) @@ -2935,7 +10196,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 108usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsInit) ) @@ -2945,7 +10206,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 112usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjects) ) @@ -2955,7 +10216,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 116usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsFinal) ) @@ -2965,7 +10226,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 120usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptInit) ) @@ -2975,7 +10236,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 124usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Encrypt) ) @@ -2985,7 +10246,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 128usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptUpdate) ) @@ -2995,7 +10256,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 132usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptFinal) ) @@ -3005,7 +10266,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 136usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptInit) ) @@ -3015,7 +10276,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 140usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Decrypt) ) @@ -3025,7 +10286,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 144usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptUpdate) ) @@ -3035,7 +10296,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 148usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptFinal) ) @@ -3045,7 +10306,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 152usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestInit) ) @@ -3055,7 +10316,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 156usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Digest) ) @@ -3065,7 +10326,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 160usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestUpdate) ) @@ -3075,7 +10336,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 164usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestKey) ) @@ -3085,7 +10346,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 168usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestFinal) ) @@ -3095,7 +10356,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 172usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignInit) ) @@ -3105,7 +10366,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 176usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Sign) ) @@ -3115,7 +10376,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 180usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignUpdate) ) @@ -3125,7 +10386,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 184usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignFinal) ) @@ -3135,7 +10396,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 188usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecoverInit) ) @@ -3145,7 +10406,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 192usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecover) ) @@ -3155,7 +10416,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 196usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyInit) ) @@ -3165,7 +10426,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 200usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Verify) ) @@ -3175,7 +10436,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 204usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyUpdate) ) @@ -3185,7 +10446,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 208usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyFinal) ) @@ -3195,7 +10456,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 212usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecoverInit) ) @@ -3205,7 +10466,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 216usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecover) ) @@ -3215,7 +10476,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 220usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestEncryptUpdate) ) @@ -3225,7 +10486,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 224usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptDigestUpdate) ) @@ -3235,7 +10496,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 228usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignEncryptUpdate) ) @@ -3245,7 +10506,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 232usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptVerifyUpdate) ) @@ -3255,7 +10516,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 236usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKey) ) @@ -3265,7 +10526,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 240usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKeyPair) ) @@ -3275,7 +10536,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 244usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WrapKey) ) @@ -3285,7 +10546,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 248usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_UnwrapKey) ) @@ -3295,7 +10556,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 252usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DeriveKey) ) @@ -3305,7 +10566,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 256usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SeedRandom) ) @@ -3315,7 +10576,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 260usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateRandom) ) @@ -3325,7 +10586,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 264usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionStatus) ) @@ -3335,7 +10596,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 268usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CancelFunction) ) @@ -3345,704 +10606,716 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 272usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WaitForSlotEvent) ) ); } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -#[test] -fn bindgen_test_layout__CK_C_INITIALIZE_ARGS() { - const UNINIT: ::std::mem::MaybeUninit<_CK_C_INITIALIZE_ARGS> = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_C_INITIALIZE_ARGS>(), - 24usize, - concat!("Size of: ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_C_INITIALIZE_ARGS>(), - 4usize, - concat!("Alignment of ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(CreateMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, - 4usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(DestroyMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, - 8usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(LockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, - 12usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(UnlockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 16usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(flags) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, - 20usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(pReserved) - ) - ); -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], -} -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, + ::libloading::Error, + >, + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -4064,7 +11337,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -4125,6 +11397,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -4134,7 +11431,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -4195,872 +11491,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/bindings/loongarch64-unknown-linux-gnu.rs b/cryptoki-sys/src/bindings/loongarch64-unknown-linux-gnu.rs index 81bdfa3d..ecfed114 100644 --- a/cryptoki-sys/src/bindings/loongarch64-unknown-linux-gnu.rs +++ b/cryptoki-sys/src/bindings/loongarch64-unknown-linux-gnu.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,211 +894,407 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_VERSION() { - const UNINIT: ::std::mem::MaybeUninit<_CK_VERSION> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_ATTRIBUTE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_VERSION>(), - 2usize, - concat!("Size of: ", stringify!(_CK_VERSION)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - ::std::mem::align_of::<_CK_VERSION>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_VERSION)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(major) + stringify!(type_) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, - 1usize, + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(minor) + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ATTRIBUTE), + "::", + stringify!(ulValueLen) ) ); } +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, + pub pReserved: *mut ::std::os::raw::c_void, } #[test] -fn bindgen_test_layout__CK_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_C_INITIALIZE_ARGS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_INFO>(), - 88usize, - concat!("Size of: ", stringify!(_CK_INFO)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - ::std::mem::align_of::<_CK_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_INFO)) + concat!("Alignment of ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(cryptokiVersion) + stringify!(CreateMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 2usize, + unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(manufacturerID) + stringify!(DestroyMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 40usize, + unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(flags) + stringify!(LockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, - 48usize, + unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryDescription) + stringify!(UnlockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryVersion) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_C_INITIALIZE_ARGS), + "::", + stringify!(pReserved) ) ); } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], } #[test] -fn bindgen_test_layout__CK_SLOT_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SLOT_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_DATE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SLOT_INFO>(), - 112usize, - concat!("Size of: ", stringify!(_CK_SLOT_INFO)) + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_DATE)) ); assert_eq!( - ::std::mem::align_of::<_CK_SLOT_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_SLOT_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_DATE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(slotDescription) + stringify!(year) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 64usize, + unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(manufacturerID) + stringify!(month) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, + 6usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(flags) + stringify!(day) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_DERIVED_KEY() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 104usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTemplate) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(hardwareVersion) + stringify!(pTemplate) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 106usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAttributeCount) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(firmwareVersion) + stringify!(ulAttributeCount) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DERIVED_KEY), + "::", + stringify!(phKey) ) ); } -impl Default for _CK_SLOT_INFO { +impl Default for CK_DERIVED_KEY { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -888,258 +1303,323 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, } #[test] -fn bindgen_test_layout__CK_TOKEN_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_TOKEN_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_VERSION() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_TOKEN_INFO>(), - 208usize, - concat!("Size of: ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::size_of::(), + 2usize, + concat!("Size of: ", stringify!(CK_VERSION)) ); assert_eq!( - ::std::mem::align_of::<_CK_TOKEN_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_VERSION)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(label) + stringify!(major) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, + 1usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(manufacturerID) + stringify!(minor) ) ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, - 64usize, + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(model) + stringify!(cryptokiVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 2usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(serialNumber) + stringify!(manufacturerID) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, - 104usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, + 48usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulMaxSessionCount) + stringify!(libraryDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, - 112usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, + 80usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulSessionCount) + stringify!(libraryVersion) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_INTERFACE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, - 120usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulMaxRwSessionCount) - ) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, - 128usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulRwSessionCount) - ) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, - 136usize, + unsafe { ::std::ptr::addr_of!((*ptr).pInterfaceName) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMaxPinLen) + stringify!(pInterfaceName) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, - 144usize, + unsafe { ::std::ptr::addr_of!((*ptr).pFunctionList) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMinPinLen) + stringify!(pFunctionList) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, - 152usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulTotalPublicMemory) + stringify!(flags) ) ); +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, - 160usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePublicMemory) + stringify!(mechanism) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, - 168usize, + unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulTotalPrivateMemory) + stringify!(pParameter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, - 176usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePrivateMemory) + stringify!(ulParameterLen) ) ); +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM_INFO)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 184usize, + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(hardwareVersion) + stringify!(ulMinKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 186usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(firmwareVersion) + stringify!(ulMaxKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, - 188usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(utcTime) + stringify!(flags) ) ); } -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { +pub struct CK_SESSION_INFO { pub slotID: CK_SLOT_ID, pub state: CK_STATE, pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, + pub ulDeviceError: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_SESSION_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SESSION_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SESSION_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SESSION_INFO>(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(_CK_SESSION_INFO)) + concat!("Size of: ", stringify!(CK_SESSION_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_SESSION_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_SESSION_INFO)) + concat!("Alignment of ", stringify!(CK_SESSION_INFO)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).slotID) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(slotID) ) @@ -1149,7 +1629,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(state) ) @@ -1159,7 +1639,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(flags) ) @@ -1169,71 +1649,87 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(ulDeviceError) ) ); } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, } #[test] -fn bindgen_test_layout__CK_ATTRIBUTE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_ATTRIBUTE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SLOT_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_ATTRIBUTE>(), - 24usize, - concat!("Size of: ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_ATTRIBUTE>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_ATTRIBUTE)) + concat!("Alignment of ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(type_) + stringify!(slotDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(pValue) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(ulValueLen) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(hardwareVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 106usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(firmwareVersion) ) ); } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SLOT_INFO { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1244,464 +1740,499 @@ impl Default for _CK_ATTRIBUTE { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], } #[test] -fn bindgen_test_layout__CK_DATE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_DATE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_TOKEN_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_DATE>(), - 8usize, - concat!("Size of: ", stringify!(_CK_DATE)) + ::std::mem::size_of::(), + 208usize, + concat!("Size of: ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_DATE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_DATE)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(year) + stringify!(label) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(month) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, - 6usize, + unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(day) + stringify!(model) ) ); -} -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM)) + unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(serialNumber) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(mechanism) + stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParameter) + stringify!(ulMaxSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulParameterLen) + stringify!(ulSessionCount) ) ); -} -impl Default for _CK_MECHANISM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM_INFO> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM_INFO>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM_INFO)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM_INFO)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, + 120usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMinKeySize) + stringify!(ulMaxRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, + 128usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMaxKeySize) + stringify!(ulRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, + 136usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(flags) + stringify!(ulMaxPinLen) ) ); -} -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAM() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(CK_OTP_PARAM)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAM)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, + 144usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(type_) + stringify!(ulMinPinLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, + 152usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pValue) + stringify!(ulTotalPublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, + 160usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulValueLen) + stringify!(ulFreePublicMemory) ) ); -} -impl Default for CK_OTP_PARAM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAMS() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_PARAMS)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, + 168usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(ulTotalPrivateMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, + 176usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(ulFreePrivateMemory) ) ); -} -impl Default for CK_OTP_PARAMS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) - ); assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(hardwareVersion) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 186usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(firmwareVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, + 188usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(utcTime) ) ); } -impl Default for CK_OTP_SIGNATURE_INFO { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_pss_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_AES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_pss_params)) + concat!("Alignment of ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(hashAlg) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(mgf) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(sLen) + stringify!(length) ) ); } -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_oaep_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_oaep_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_oaep_params)) + concat!("Alignment of ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(hashAlg) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(source) + stringify!(ulNonceLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(pSourceData) + stringify!(pAAD) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, 32usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(ulSourceDataLen) + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_AES_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_rsa_pkcs_oaep_params { +impl Default for CK_AES_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1712,30 +2243,30 @@ impl Default for ck_rsa_pkcs_oaep_params { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], } #[test] -fn bindgen_test_layout_ck_aes_ctr_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 24usize, - concat!("Size of: ", stringify!(ck_aes_ctr_params)) + concat!("Size of: ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_ctr_params)) + concat!("Alignment of ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(ulCounterBits) ) @@ -1745,7 +2276,7 @@ fn bindgen_test_layout_ck_aes_ctr_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(cb) ) @@ -1753,34 +2284,34 @@ fn bindgen_test_layout_ck_aes_ctr_params() { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_gcm_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 48usize, - concat!("Size of: ", stringify!(ck_gcm_params)) + concat!("Size of: ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_gcm_params)) + concat!("Alignment of ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pIv) ) @@ -1790,7 +2321,7 @@ fn bindgen_test_layout_ck_gcm_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvLen) ) @@ -1800,7 +2331,7 @@ fn bindgen_test_layout_ck_gcm_params() { 16usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvBits) ) @@ -1810,7 +2341,7 @@ fn bindgen_test_layout_ck_gcm_params() { 24usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pAAD) ) @@ -1820,7 +2351,7 @@ fn bindgen_test_layout_ck_gcm_params() { 32usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulAADLen) ) @@ -1830,13 +2361,13 @@ fn bindgen_test_layout_ck_gcm_params() { 40usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulTagBits) ) ); } -impl Default for ck_gcm_params { +impl Default for CK_AES_GCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1845,83 +2376,125 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_ecdh1_derive_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_ARIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_ecdh1_derive_params)) + concat!("Alignment of ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(kdf) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulSharedDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pSharedData) + stringify!(length) ) ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, - 24usize, +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulPublicDataLen) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pPublicData) + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) ) ); } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1931,48 +2504,145 @@ impl Default for ck_ecdh1_derive_params { } } #[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(ulCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cb) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(cb) + ) + ); +} +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_key_derivation_string_data() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_CCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(ck_key_derivation_string_data)) + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_key_derivation_string_data)) + concat!("Alignment of ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(pData) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(ulLen) + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceFixedBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).nonceGenerator) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(nonceGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMAC) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pMAC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_key_derivation_string_data { +impl Default for CK_CCM_MESSAGE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1983,58 +2653,90 @@ impl Default for ck_key_derivation_string_data { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_des_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_des_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(iv) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(length) + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2045,58 +2747,68 @@ impl Default for ck_des_cbc_encrypt_data_params { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_aes_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CHACHA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Size of: ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(iv) + stringify!(pBlockCounter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).blockCounterBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CHACHA20_PARAMS), + "::", + stringify!(blockCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(length) + stringify!(ulNonceBits) ) ); } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_CHACHA20_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2105,478 +2817,7027 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_Initialize = - ::std::option::Option CK_RV>; -pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; -pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, ->; -pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismList = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismInfo = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, - ) -> CK_RV, ->; -pub type CK_C_InitToken = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, - ) -> CK_RV, ->; -pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_OpenSession = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; -pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; -pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, ->; -pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_Login = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_Logout = - ::std::option::Option CK_RV>; -pub type CK_C_CreateObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CopyObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, ->; -pub type CK_C_GetObjectSize = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjects = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; -pub type CK_C_EncryptInit = ::std::option::Option< +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CMS_SIG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).certificateHandle) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(certificateHandle) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSigningMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pSigningMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDigestMechanism) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pDigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContentType) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pContentType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequestedAttributes) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequestedAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequestedAttributesLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequestedAttributesLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequiredAttributes) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequiredAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequiredAttributesLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequiredAttributesLen) + ) + ); +} +impl Default for CK_CMS_SIG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DSA_PARAMETER_GEN_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(hash) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIndex) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulIndex) + ) + ); +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pSharedData) + ) + ); +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_ECMQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_EDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phFlag) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(phFlag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(ulContextDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(pContextData) + ) + ); +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvFixedBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ivGenerator) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ivGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pTag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pWrapOID) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pWrapOID) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWrapOIDLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulWrapOIDLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(hKey) + ) + ); +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_HKDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExtract) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExtract) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExpand) as usize - ptr as usize }, + 1usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExpand) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltType) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hSaltKey) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(hSaltKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulInfoLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulInfoLen) + ) + ); +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_KEA_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).isSender) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(isSender) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomA) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomB) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomB) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_DERIVATION_STRING_DATA() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(ulLen) + ) + ); +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_WRAP_SET_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bBC) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(bBC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(pX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulXLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(ulXLen) + ) + ); +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KIP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PBE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitVector) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pInitVector) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIteration) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulIteration) + ) + ); +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS2() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PRF_DATA_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[test] +fn bindgen_test_layout_CK_RC2_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(iv) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC2_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulRounds) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +#[test] +fn bindgen_test_layout_CK_RSA_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOAEPParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pOAEPParams) + ) + ); +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(source) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(pSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(ulSourceDataLen) + ) + ); +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_PSS_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(sLen) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!( + "Size of: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pTag) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pBlockCounter) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(ulNonceBits) + ) + ); +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SEED_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_PRIVATE_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPAndGLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPAndGLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulQLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulQLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrimeP) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPrimeP) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBaseG) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pBaseG) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSubprimeQ) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pSubprimeQ) + ) + ); +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_RELAYX_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldWrappedXLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldWrappedXLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldWrappedX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldWrappedX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPassword) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPassword) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPublicDataLen) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPublicData) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewRandomLen) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewRandomA) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewRandomA) + ) + ); +} +impl Default for CK_SKIPJACK_RELAYX_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_COUNTER_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_DKM_LENGTH_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).dkmLengthMethod) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(dkmLengthMethod) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_FEEDBACK_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulIVLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pIV) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_INITIALIZE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).initiator_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(initiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_INITIATE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_prekey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_signature) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPrekey_signature) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_key) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOnetime_key) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_identity) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_ephemeral) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_ephemeral) + ) + ); +} +impl Default for CK_X3DH_INITIATE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIdentity_id) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pIdentity_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_id) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pPrekey_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_id) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pOnetime_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_identity) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_ephemeral) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_ephemeral) + ) + ); +} +impl Default for CK_X3DH_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_MQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).OtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(OtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, +} +#[test] +fn bindgen_test_layout_CK_XEDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_XEDDSA_PARAMS), + "::", + stringify!(hash) + ) + ); +} +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerMacSecret) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerKey) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVClient) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVClient) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVServer) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVServer) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SSL3_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_SSL3_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(prfMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulLabelLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pContextData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLength) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulContextDataLength) + ) + ); +} +impl Default for CK_TLS_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_MAC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerOrClient) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulServerOrClient) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_TLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(pIV) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSequenceNumber) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulSequenceNumber) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_WTLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +pub type CK_C_Initialize = + ::std::option::Option CK_RV>; +pub type CK_C_Finalize = + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; +pub type CK_C_GetSlotList = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; +pub type CK_C_GetTokenInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, +>; +pub type CK_C_GetMechanismList = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetMechanismInfo = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, + ) -> CK_RV, +>; +pub type CK_C_InitToken = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + ) -> CK_RV, +>; +pub type CK_C_InitPIN = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetPIN = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_OpenSession = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CloseSession = + ::std::option::Option CK_RV>; +pub type CK_C_CloseAllSessions = + ::std::option::Option CK_RV>; +pub type CK_C_GetSessionInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, +>; +pub type CK_C_GetOperationState = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetOperationState = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_Login = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_Logout = + ::std::option::Option CK_RV>; +pub type CK_C_CreateObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CopyObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DestroyObject = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, +>; +pub type CK_C_GetObjectSize = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsInit = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_FindObjects = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsFinal = + ::std::option::Option CK_RV>; +pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Sign = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SignFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SignRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Verify = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_VerifyRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptDigestUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_UnwrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DeriveKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; +pub type CK_C_LoginUser = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, +} +#[test] +fn bindgen_test_layout_CK_FUNCTION_LIST_3_0() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 744usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(version) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Initialize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Finalize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetTokenInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitToken) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_OpenSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, + 112usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseAllSessions) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, + 128usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSessionInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, + 144usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, + 152usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Login) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, + 160usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Logout) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, + 168usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CreateObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, + 176usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CopyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DestroyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, + 192usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetObjectSize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, + 200usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, + 208usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, + 216usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, + 224usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjects) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, + 232usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, + 240usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, + 248usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Encrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, + 256usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, + 264usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, + 272usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, + 280usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Decrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, + 288usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, + 296usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, + 304usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, + 312usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Digest) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, + 320usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, + 328usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, + 336usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, + 344usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, + 352usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Sign) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, + 360usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, + 368usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, + 376usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, + 384usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, + 392usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, + 400usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Verify) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, + 408usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, + 416usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, + 424usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, + 432usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, + 440usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, + 448usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptDigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, + 456usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, + 464usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptVerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, + 472usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, + 480usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKeyPair) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, + 488usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, + 496usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_UnwrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, + 504usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DeriveKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, + 512usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SeedRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, + 520usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, + 528usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionStatus) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, + 536usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CancelFunction) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, + 544usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WaitForSlotEvent) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterfaceList) as usize - ptr as usize }, + 552usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterfaceList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterface) as usize - ptr as usize }, + 560usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterface) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_LoginUser) as usize - ptr as usize }, + 568usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_LoginUser) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SessionCancel) as usize - ptr as usize }, + 576usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SessionCancel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptInit) as usize - ptr as usize }, + 584usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessage) as usize - ptr as usize }, + 592usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageBegin) as usize - ptr as usize }, + 600usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageNext) as usize - ptr as usize }, + 608usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptFinal) as usize - ptr as usize }, + 616usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptInit) as usize - ptr as usize }, + 624usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessage) as usize - ptr as usize }, + 632usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageBegin) as usize - ptr as usize }, + 640usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageNext) as usize - ptr as usize }, + 648usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptFinal) as usize - ptr as usize }, + 656usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignInit) as usize - ptr as usize }, + 664usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessage) as usize - ptr as usize }, + 672usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageBegin) as usize - ptr as usize }, + 680usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageNext) as usize - ptr as usize }, + 688usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignFinal) as usize - ptr as usize }, + 696usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyInit) as usize - ptr as usize }, + 704usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessage) as usize - ptr as usize }, + 712usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageBegin) as usize - ptr as usize }, + 720usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageNext) as usize - ptr as usize }, + 728usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyFinal) as usize - ptr as usize }, + 736usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyFinal) + ) + ); +} #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -2647,25 +9908,25 @@ pub struct _CK_FUNCTION_LIST { pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } #[test] -fn bindgen_test_layout__CK_FUNCTION_LIST() { - const UNINIT: ::std::mem::MaybeUninit<_CK_FUNCTION_LIST> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_FUNCTION_LIST() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_FUNCTION_LIST>(), + ::std::mem::size_of::(), 552usize, - concat!("Size of: ", stringify!(_CK_FUNCTION_LIST)) + concat!("Size of: ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( - ::std::mem::align_of::<_CK_FUNCTION_LIST>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_FUNCTION_LIST)) + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(version) ) @@ -2675,7 +9936,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Initialize) ) @@ -2685,7 +9946,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Finalize) ) @@ -2695,7 +9956,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetInfo) ) @@ -2705,7 +9966,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 32usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionList) ) @@ -2715,7 +9976,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 40usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotList) ) @@ -2725,7 +9986,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 48usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotInfo) ) @@ -2735,7 +9996,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 56usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetTokenInfo) ) @@ -2745,7 +10006,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 64usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismList) ) @@ -2755,7 +10016,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 72usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismInfo) ) @@ -2765,7 +10026,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 80usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitToken) ) @@ -2775,7 +10036,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 88usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitPIN) ) @@ -2785,7 +10046,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 96usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetPIN) ) @@ -2795,7 +10056,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 104usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_OpenSession) ) @@ -2805,7 +10066,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 112usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseSession) ) @@ -2815,7 +10076,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 120usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseAllSessions) ) @@ -2825,7 +10086,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 128usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSessionInfo) ) @@ -2835,7 +10096,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 136usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetOperationState) ) @@ -2845,7 +10106,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 144usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetOperationState) ) @@ -2855,7 +10116,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 152usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Login) ) @@ -2865,7 +10126,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 160usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Logout) ) @@ -2875,7 +10136,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 168usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CreateObject) ) @@ -2885,7 +10146,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 176usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CopyObject) ) @@ -2895,7 +10156,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 184usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DestroyObject) ) @@ -2905,7 +10166,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 192usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetObjectSize) ) @@ -2915,7 +10176,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 200usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetAttributeValue) ) @@ -2925,7 +10186,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 208usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetAttributeValue) ) @@ -2935,7 +10196,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 216usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsInit) ) @@ -2945,7 +10206,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 224usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjects) ) @@ -2955,7 +10216,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 232usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsFinal) ) @@ -2965,7 +10226,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 240usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptInit) ) @@ -2975,7 +10236,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 248usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Encrypt) ) @@ -2985,7 +10246,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 256usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptUpdate) ) @@ -2995,7 +10256,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 264usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptFinal) ) @@ -3005,7 +10266,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 272usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptInit) ) @@ -3015,7 +10276,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 280usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Decrypt) ) @@ -3025,7 +10286,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 288usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptUpdate) ) @@ -3035,7 +10296,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 296usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptFinal) ) @@ -3045,7 +10306,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 304usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestInit) ) @@ -3055,7 +10316,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 312usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Digest) ) @@ -3065,7 +10326,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 320usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestUpdate) ) @@ -3075,7 +10336,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 328usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestKey) ) @@ -3085,7 +10346,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 336usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestFinal) ) @@ -3095,7 +10356,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 344usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignInit) ) @@ -3105,7 +10366,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 352usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Sign) ) @@ -3115,7 +10376,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 360usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignUpdate) ) @@ -3125,7 +10386,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 368usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignFinal) ) @@ -3135,7 +10396,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 376usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecoverInit) ) @@ -3145,7 +10406,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 384usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecover) ) @@ -3155,7 +10416,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 392usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyInit) ) @@ -3165,7 +10426,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 400usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Verify) ) @@ -3175,7 +10436,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 408usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyUpdate) ) @@ -3185,7 +10446,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 416usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyFinal) ) @@ -3195,7 +10456,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 424usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecoverInit) ) @@ -3205,7 +10466,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 432usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecover) ) @@ -3215,7 +10476,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 440usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestEncryptUpdate) ) @@ -3225,7 +10486,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 448usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptDigestUpdate) ) @@ -3235,7 +10496,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 456usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignEncryptUpdate) ) @@ -3245,7 +10506,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 464usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptVerifyUpdate) ) @@ -3255,7 +10516,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 472usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKey) ) @@ -3265,7 +10526,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 480usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKeyPair) ) @@ -3275,7 +10536,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 488usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WrapKey) ) @@ -3285,7 +10546,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 496usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_UnwrapKey) ) @@ -3295,7 +10556,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 504usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DeriveKey) ) @@ -3305,7 +10566,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 512usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SeedRandom) ) @@ -3315,7 +10576,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 520usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateRandom) ) @@ -3325,7 +10586,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 528usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionStatus) ) @@ -3335,7 +10596,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 536usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CancelFunction) ) @@ -3345,704 +10606,716 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 544usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WaitForSlotEvent) ) ); } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -#[test] -fn bindgen_test_layout__CK_C_INITIALIZE_ARGS() { - const UNINIT: ::std::mem::MaybeUninit<_CK_C_INITIALIZE_ARGS> = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_C_INITIALIZE_ARGS>(), - 48usize, - concat!("Size of: ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_C_INITIALIZE_ARGS>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(CreateMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, - 8usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(DestroyMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, - 16usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(LockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, - 24usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(UnlockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 32usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(flags) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, - 40usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(pReserved) - ) - ); -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], -} -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, + ::libloading::Error, + >, + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -4064,7 +11337,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -4125,6 +11397,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -4134,7 +11431,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -4195,872 +11491,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/bindings/powerpc64-unknown-linux-gnu.rs b/cryptoki-sys/src/bindings/powerpc64-unknown-linux-gnu.rs index 81bdfa3d..ecfed114 100644 --- a/cryptoki-sys/src/bindings/powerpc64-unknown-linux-gnu.rs +++ b/cryptoki-sys/src/bindings/powerpc64-unknown-linux-gnu.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,211 +894,407 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_VERSION() { - const UNINIT: ::std::mem::MaybeUninit<_CK_VERSION> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_ATTRIBUTE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_VERSION>(), - 2usize, - concat!("Size of: ", stringify!(_CK_VERSION)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - ::std::mem::align_of::<_CK_VERSION>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_VERSION)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(major) + stringify!(type_) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, - 1usize, + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(minor) + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ATTRIBUTE), + "::", + stringify!(ulValueLen) ) ); } +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, + pub pReserved: *mut ::std::os::raw::c_void, } #[test] -fn bindgen_test_layout__CK_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_C_INITIALIZE_ARGS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_INFO>(), - 88usize, - concat!("Size of: ", stringify!(_CK_INFO)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - ::std::mem::align_of::<_CK_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_INFO)) + concat!("Alignment of ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(cryptokiVersion) + stringify!(CreateMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 2usize, + unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(manufacturerID) + stringify!(DestroyMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 40usize, + unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(flags) + stringify!(LockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, - 48usize, + unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryDescription) + stringify!(UnlockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryVersion) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_C_INITIALIZE_ARGS), + "::", + stringify!(pReserved) ) ); } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], } #[test] -fn bindgen_test_layout__CK_SLOT_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SLOT_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_DATE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SLOT_INFO>(), - 112usize, - concat!("Size of: ", stringify!(_CK_SLOT_INFO)) + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_DATE)) ); assert_eq!( - ::std::mem::align_of::<_CK_SLOT_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_SLOT_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_DATE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(slotDescription) + stringify!(year) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 64usize, + unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(manufacturerID) + stringify!(month) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, + 6usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(flags) + stringify!(day) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_DERIVED_KEY() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 104usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTemplate) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(hardwareVersion) + stringify!(pTemplate) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 106usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAttributeCount) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(firmwareVersion) + stringify!(ulAttributeCount) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DERIVED_KEY), + "::", + stringify!(phKey) ) ); } -impl Default for _CK_SLOT_INFO { +impl Default for CK_DERIVED_KEY { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -888,258 +1303,323 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, } #[test] -fn bindgen_test_layout__CK_TOKEN_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_TOKEN_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_VERSION() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_TOKEN_INFO>(), - 208usize, - concat!("Size of: ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::size_of::(), + 2usize, + concat!("Size of: ", stringify!(CK_VERSION)) ); assert_eq!( - ::std::mem::align_of::<_CK_TOKEN_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_VERSION)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(label) + stringify!(major) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, + 1usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(manufacturerID) + stringify!(minor) ) ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, - 64usize, + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(model) + stringify!(cryptokiVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 2usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(serialNumber) + stringify!(manufacturerID) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, - 104usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, + 48usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulMaxSessionCount) + stringify!(libraryDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, - 112usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, + 80usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulSessionCount) + stringify!(libraryVersion) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_INTERFACE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, - 120usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulMaxRwSessionCount) - ) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, - 128usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulRwSessionCount) - ) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, - 136usize, + unsafe { ::std::ptr::addr_of!((*ptr).pInterfaceName) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMaxPinLen) + stringify!(pInterfaceName) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, - 144usize, + unsafe { ::std::ptr::addr_of!((*ptr).pFunctionList) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMinPinLen) + stringify!(pFunctionList) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, - 152usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulTotalPublicMemory) + stringify!(flags) ) ); +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, - 160usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePublicMemory) + stringify!(mechanism) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, - 168usize, + unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulTotalPrivateMemory) + stringify!(pParameter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, - 176usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePrivateMemory) + stringify!(ulParameterLen) ) ); +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM_INFO)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 184usize, + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(hardwareVersion) + stringify!(ulMinKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 186usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(firmwareVersion) + stringify!(ulMaxKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, - 188usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(utcTime) + stringify!(flags) ) ); } -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { +pub struct CK_SESSION_INFO { pub slotID: CK_SLOT_ID, pub state: CK_STATE, pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, + pub ulDeviceError: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_SESSION_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SESSION_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SESSION_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SESSION_INFO>(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(_CK_SESSION_INFO)) + concat!("Size of: ", stringify!(CK_SESSION_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_SESSION_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_SESSION_INFO)) + concat!("Alignment of ", stringify!(CK_SESSION_INFO)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).slotID) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(slotID) ) @@ -1149,7 +1629,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(state) ) @@ -1159,7 +1639,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(flags) ) @@ -1169,71 +1649,87 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(ulDeviceError) ) ); } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, } #[test] -fn bindgen_test_layout__CK_ATTRIBUTE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_ATTRIBUTE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SLOT_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_ATTRIBUTE>(), - 24usize, - concat!("Size of: ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_ATTRIBUTE>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_ATTRIBUTE)) + concat!("Alignment of ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(type_) + stringify!(slotDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(pValue) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(ulValueLen) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(hardwareVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 106usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(firmwareVersion) ) ); } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SLOT_INFO { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1244,464 +1740,499 @@ impl Default for _CK_ATTRIBUTE { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], } #[test] -fn bindgen_test_layout__CK_DATE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_DATE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_TOKEN_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_DATE>(), - 8usize, - concat!("Size of: ", stringify!(_CK_DATE)) + ::std::mem::size_of::(), + 208usize, + concat!("Size of: ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_DATE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_DATE)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(year) + stringify!(label) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(month) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, - 6usize, + unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(day) + stringify!(model) ) ); -} -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM)) + unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(serialNumber) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(mechanism) + stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParameter) + stringify!(ulMaxSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulParameterLen) + stringify!(ulSessionCount) ) ); -} -impl Default for _CK_MECHANISM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM_INFO> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM_INFO>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM_INFO)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM_INFO)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, + 120usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMinKeySize) + stringify!(ulMaxRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, + 128usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMaxKeySize) + stringify!(ulRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, + 136usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(flags) + stringify!(ulMaxPinLen) ) ); -} -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAM() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(CK_OTP_PARAM)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAM)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, + 144usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(type_) + stringify!(ulMinPinLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, + 152usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pValue) + stringify!(ulTotalPublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, + 160usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulValueLen) + stringify!(ulFreePublicMemory) ) ); -} -impl Default for CK_OTP_PARAM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAMS() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_PARAMS)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, + 168usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(ulTotalPrivateMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, + 176usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(ulFreePrivateMemory) ) ); -} -impl Default for CK_OTP_PARAMS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) - ); assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(hardwareVersion) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 186usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(firmwareVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, + 188usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(utcTime) ) ); } -impl Default for CK_OTP_SIGNATURE_INFO { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_pss_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_AES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_pss_params)) + concat!("Alignment of ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(hashAlg) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(mgf) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(sLen) + stringify!(length) ) ); } -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_oaep_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_oaep_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_oaep_params)) + concat!("Alignment of ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(hashAlg) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(source) + stringify!(ulNonceLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(pSourceData) + stringify!(pAAD) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, 32usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(ulSourceDataLen) + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_AES_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_rsa_pkcs_oaep_params { +impl Default for CK_AES_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1712,30 +2243,30 @@ impl Default for ck_rsa_pkcs_oaep_params { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], } #[test] -fn bindgen_test_layout_ck_aes_ctr_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 24usize, - concat!("Size of: ", stringify!(ck_aes_ctr_params)) + concat!("Size of: ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_ctr_params)) + concat!("Alignment of ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(ulCounterBits) ) @@ -1745,7 +2276,7 @@ fn bindgen_test_layout_ck_aes_ctr_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(cb) ) @@ -1753,34 +2284,34 @@ fn bindgen_test_layout_ck_aes_ctr_params() { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_gcm_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 48usize, - concat!("Size of: ", stringify!(ck_gcm_params)) + concat!("Size of: ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_gcm_params)) + concat!("Alignment of ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pIv) ) @@ -1790,7 +2321,7 @@ fn bindgen_test_layout_ck_gcm_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvLen) ) @@ -1800,7 +2331,7 @@ fn bindgen_test_layout_ck_gcm_params() { 16usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvBits) ) @@ -1810,7 +2341,7 @@ fn bindgen_test_layout_ck_gcm_params() { 24usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pAAD) ) @@ -1820,7 +2351,7 @@ fn bindgen_test_layout_ck_gcm_params() { 32usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulAADLen) ) @@ -1830,13 +2361,13 @@ fn bindgen_test_layout_ck_gcm_params() { 40usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulTagBits) ) ); } -impl Default for ck_gcm_params { +impl Default for CK_AES_GCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1845,83 +2376,125 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_ecdh1_derive_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_ARIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_ecdh1_derive_params)) + concat!("Alignment of ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(kdf) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulSharedDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pSharedData) + stringify!(length) ) ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, - 24usize, +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulPublicDataLen) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pPublicData) + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) ) ); } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1931,48 +2504,145 @@ impl Default for ck_ecdh1_derive_params { } } #[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(ulCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cb) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(cb) + ) + ); +} +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_key_derivation_string_data() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_CCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(ck_key_derivation_string_data)) + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_key_derivation_string_data)) + concat!("Alignment of ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(pData) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(ulLen) + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceFixedBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).nonceGenerator) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(nonceGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMAC) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pMAC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_key_derivation_string_data { +impl Default for CK_CCM_MESSAGE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1983,58 +2653,90 @@ impl Default for ck_key_derivation_string_data { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_des_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_des_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(iv) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(length) + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2045,58 +2747,68 @@ impl Default for ck_des_cbc_encrypt_data_params { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_aes_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CHACHA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Size of: ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(iv) + stringify!(pBlockCounter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).blockCounterBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CHACHA20_PARAMS), + "::", + stringify!(blockCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(length) + stringify!(ulNonceBits) ) ); } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_CHACHA20_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2105,478 +2817,7027 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_Initialize = - ::std::option::Option CK_RV>; -pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; -pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, ->; -pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismList = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismInfo = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, - ) -> CK_RV, ->; -pub type CK_C_InitToken = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, - ) -> CK_RV, ->; -pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_OpenSession = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; -pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; -pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, ->; -pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_Login = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_Logout = - ::std::option::Option CK_RV>; -pub type CK_C_CreateObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CopyObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, ->; -pub type CK_C_GetObjectSize = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjects = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; -pub type CK_C_EncryptInit = ::std::option::Option< +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CMS_SIG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).certificateHandle) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(certificateHandle) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSigningMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pSigningMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDigestMechanism) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pDigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContentType) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pContentType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequestedAttributes) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequestedAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequestedAttributesLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequestedAttributesLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequiredAttributes) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequiredAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequiredAttributesLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequiredAttributesLen) + ) + ); +} +impl Default for CK_CMS_SIG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DSA_PARAMETER_GEN_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(hash) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIndex) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulIndex) + ) + ); +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pSharedData) + ) + ); +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_ECMQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_EDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phFlag) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(phFlag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(ulContextDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(pContextData) + ) + ); +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvFixedBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ivGenerator) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ivGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pTag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pWrapOID) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pWrapOID) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWrapOIDLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulWrapOIDLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(hKey) + ) + ); +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_HKDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExtract) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExtract) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExpand) as usize - ptr as usize }, + 1usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExpand) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltType) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hSaltKey) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(hSaltKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulInfoLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulInfoLen) + ) + ); +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_KEA_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).isSender) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(isSender) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomA) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomB) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomB) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_DERIVATION_STRING_DATA() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(ulLen) + ) + ); +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_WRAP_SET_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bBC) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(bBC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(pX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulXLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(ulXLen) + ) + ); +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KIP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PBE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitVector) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pInitVector) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIteration) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulIteration) + ) + ); +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS2() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PRF_DATA_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[test] +fn bindgen_test_layout_CK_RC2_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(iv) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC2_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulRounds) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +#[test] +fn bindgen_test_layout_CK_RSA_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOAEPParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pOAEPParams) + ) + ); +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(source) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(pSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(ulSourceDataLen) + ) + ); +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_PSS_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(sLen) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!( + "Size of: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pTag) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pBlockCounter) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(ulNonceBits) + ) + ); +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SEED_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_PRIVATE_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPAndGLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPAndGLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulQLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulQLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrimeP) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPrimeP) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBaseG) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pBaseG) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSubprimeQ) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pSubprimeQ) + ) + ); +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_RELAYX_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldWrappedXLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldWrappedXLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldWrappedX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldWrappedX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPassword) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPassword) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPublicDataLen) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPublicData) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewRandomLen) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewRandomA) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewRandomA) + ) + ); +} +impl Default for CK_SKIPJACK_RELAYX_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_COUNTER_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_DKM_LENGTH_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).dkmLengthMethod) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(dkmLengthMethod) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_FEEDBACK_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulIVLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pIV) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_INITIALIZE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).initiator_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(initiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_INITIATE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_prekey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_signature) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPrekey_signature) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_key) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOnetime_key) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_identity) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_ephemeral) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_ephemeral) + ) + ); +} +impl Default for CK_X3DH_INITIATE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIdentity_id) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pIdentity_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_id) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pPrekey_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_id) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pOnetime_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_identity) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_ephemeral) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_ephemeral) + ) + ); +} +impl Default for CK_X3DH_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_MQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).OtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(OtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, +} +#[test] +fn bindgen_test_layout_CK_XEDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_XEDDSA_PARAMS), + "::", + stringify!(hash) + ) + ); +} +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerMacSecret) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerKey) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVClient) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVClient) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVServer) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVServer) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SSL3_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_SSL3_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(prfMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulLabelLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pContextData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLength) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulContextDataLength) + ) + ); +} +impl Default for CK_TLS_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_MAC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerOrClient) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulServerOrClient) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_TLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(pIV) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSequenceNumber) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulSequenceNumber) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_WTLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +pub type CK_C_Initialize = + ::std::option::Option CK_RV>; +pub type CK_C_Finalize = + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; +pub type CK_C_GetSlotList = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; +pub type CK_C_GetTokenInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, +>; +pub type CK_C_GetMechanismList = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetMechanismInfo = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, + ) -> CK_RV, +>; +pub type CK_C_InitToken = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + ) -> CK_RV, +>; +pub type CK_C_InitPIN = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetPIN = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_OpenSession = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CloseSession = + ::std::option::Option CK_RV>; +pub type CK_C_CloseAllSessions = + ::std::option::Option CK_RV>; +pub type CK_C_GetSessionInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, +>; +pub type CK_C_GetOperationState = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetOperationState = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_Login = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_Logout = + ::std::option::Option CK_RV>; +pub type CK_C_CreateObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CopyObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DestroyObject = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, +>; +pub type CK_C_GetObjectSize = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsInit = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_FindObjects = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsFinal = + ::std::option::Option CK_RV>; +pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Sign = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SignFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SignRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Verify = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_VerifyRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptDigestUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_UnwrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DeriveKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; +pub type CK_C_LoginUser = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, +} +#[test] +fn bindgen_test_layout_CK_FUNCTION_LIST_3_0() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 744usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(version) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Initialize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Finalize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetTokenInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitToken) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_OpenSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, + 112usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseAllSessions) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, + 128usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSessionInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, + 144usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, + 152usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Login) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, + 160usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Logout) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, + 168usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CreateObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, + 176usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CopyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DestroyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, + 192usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetObjectSize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, + 200usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, + 208usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, + 216usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, + 224usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjects) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, + 232usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, + 240usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, + 248usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Encrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, + 256usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, + 264usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, + 272usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, + 280usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Decrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, + 288usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, + 296usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, + 304usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, + 312usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Digest) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, + 320usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, + 328usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, + 336usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, + 344usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, + 352usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Sign) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, + 360usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, + 368usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, + 376usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, + 384usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, + 392usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, + 400usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Verify) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, + 408usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, + 416usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, + 424usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, + 432usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, + 440usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, + 448usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptDigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, + 456usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, + 464usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptVerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, + 472usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, + 480usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKeyPair) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, + 488usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, + 496usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_UnwrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, + 504usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DeriveKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, + 512usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SeedRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, + 520usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, + 528usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionStatus) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, + 536usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CancelFunction) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, + 544usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WaitForSlotEvent) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterfaceList) as usize - ptr as usize }, + 552usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterfaceList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterface) as usize - ptr as usize }, + 560usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterface) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_LoginUser) as usize - ptr as usize }, + 568usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_LoginUser) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SessionCancel) as usize - ptr as usize }, + 576usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SessionCancel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptInit) as usize - ptr as usize }, + 584usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessage) as usize - ptr as usize }, + 592usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageBegin) as usize - ptr as usize }, + 600usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageNext) as usize - ptr as usize }, + 608usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptFinal) as usize - ptr as usize }, + 616usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptInit) as usize - ptr as usize }, + 624usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessage) as usize - ptr as usize }, + 632usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageBegin) as usize - ptr as usize }, + 640usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageNext) as usize - ptr as usize }, + 648usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptFinal) as usize - ptr as usize }, + 656usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignInit) as usize - ptr as usize }, + 664usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessage) as usize - ptr as usize }, + 672usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageBegin) as usize - ptr as usize }, + 680usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageNext) as usize - ptr as usize }, + 688usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignFinal) as usize - ptr as usize }, + 696usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyInit) as usize - ptr as usize }, + 704usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessage) as usize - ptr as usize }, + 712usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageBegin) as usize - ptr as usize }, + 720usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageNext) as usize - ptr as usize }, + 728usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyFinal) as usize - ptr as usize }, + 736usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyFinal) + ) + ); +} #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -2647,25 +9908,25 @@ pub struct _CK_FUNCTION_LIST { pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } #[test] -fn bindgen_test_layout__CK_FUNCTION_LIST() { - const UNINIT: ::std::mem::MaybeUninit<_CK_FUNCTION_LIST> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_FUNCTION_LIST() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_FUNCTION_LIST>(), + ::std::mem::size_of::(), 552usize, - concat!("Size of: ", stringify!(_CK_FUNCTION_LIST)) + concat!("Size of: ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( - ::std::mem::align_of::<_CK_FUNCTION_LIST>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_FUNCTION_LIST)) + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(version) ) @@ -2675,7 +9936,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Initialize) ) @@ -2685,7 +9946,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Finalize) ) @@ -2695,7 +9956,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetInfo) ) @@ -2705,7 +9966,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 32usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionList) ) @@ -2715,7 +9976,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 40usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotList) ) @@ -2725,7 +9986,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 48usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotInfo) ) @@ -2735,7 +9996,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 56usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetTokenInfo) ) @@ -2745,7 +10006,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 64usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismList) ) @@ -2755,7 +10016,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 72usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismInfo) ) @@ -2765,7 +10026,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 80usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitToken) ) @@ -2775,7 +10036,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 88usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitPIN) ) @@ -2785,7 +10046,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 96usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetPIN) ) @@ -2795,7 +10056,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 104usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_OpenSession) ) @@ -2805,7 +10066,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 112usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseSession) ) @@ -2815,7 +10076,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 120usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseAllSessions) ) @@ -2825,7 +10086,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 128usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSessionInfo) ) @@ -2835,7 +10096,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 136usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetOperationState) ) @@ -2845,7 +10106,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 144usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetOperationState) ) @@ -2855,7 +10116,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 152usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Login) ) @@ -2865,7 +10126,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 160usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Logout) ) @@ -2875,7 +10136,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 168usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CreateObject) ) @@ -2885,7 +10146,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 176usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CopyObject) ) @@ -2895,7 +10156,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 184usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DestroyObject) ) @@ -2905,7 +10166,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 192usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetObjectSize) ) @@ -2915,7 +10176,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 200usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetAttributeValue) ) @@ -2925,7 +10186,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 208usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetAttributeValue) ) @@ -2935,7 +10196,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 216usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsInit) ) @@ -2945,7 +10206,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 224usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjects) ) @@ -2955,7 +10216,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 232usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsFinal) ) @@ -2965,7 +10226,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 240usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptInit) ) @@ -2975,7 +10236,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 248usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Encrypt) ) @@ -2985,7 +10246,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 256usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptUpdate) ) @@ -2995,7 +10256,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 264usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptFinal) ) @@ -3005,7 +10266,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 272usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptInit) ) @@ -3015,7 +10276,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 280usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Decrypt) ) @@ -3025,7 +10286,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 288usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptUpdate) ) @@ -3035,7 +10296,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 296usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptFinal) ) @@ -3045,7 +10306,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 304usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestInit) ) @@ -3055,7 +10316,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 312usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Digest) ) @@ -3065,7 +10326,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 320usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestUpdate) ) @@ -3075,7 +10336,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 328usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestKey) ) @@ -3085,7 +10346,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 336usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestFinal) ) @@ -3095,7 +10356,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 344usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignInit) ) @@ -3105,7 +10366,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 352usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Sign) ) @@ -3115,7 +10376,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 360usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignUpdate) ) @@ -3125,7 +10386,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 368usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignFinal) ) @@ -3135,7 +10396,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 376usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecoverInit) ) @@ -3145,7 +10406,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 384usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecover) ) @@ -3155,7 +10416,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 392usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyInit) ) @@ -3165,7 +10426,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 400usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Verify) ) @@ -3175,7 +10436,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 408usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyUpdate) ) @@ -3185,7 +10446,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 416usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyFinal) ) @@ -3195,7 +10456,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 424usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecoverInit) ) @@ -3205,7 +10466,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 432usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecover) ) @@ -3215,7 +10476,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 440usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestEncryptUpdate) ) @@ -3225,7 +10486,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 448usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptDigestUpdate) ) @@ -3235,7 +10496,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 456usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignEncryptUpdate) ) @@ -3245,7 +10506,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 464usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptVerifyUpdate) ) @@ -3255,7 +10516,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 472usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKey) ) @@ -3265,7 +10526,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 480usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKeyPair) ) @@ -3275,7 +10536,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 488usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WrapKey) ) @@ -3285,7 +10546,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 496usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_UnwrapKey) ) @@ -3295,7 +10556,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 504usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DeriveKey) ) @@ -3305,7 +10566,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 512usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SeedRandom) ) @@ -3315,7 +10576,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 520usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateRandom) ) @@ -3325,7 +10586,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 528usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionStatus) ) @@ -3335,7 +10596,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 536usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CancelFunction) ) @@ -3345,704 +10606,716 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 544usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WaitForSlotEvent) ) ); } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -#[test] -fn bindgen_test_layout__CK_C_INITIALIZE_ARGS() { - const UNINIT: ::std::mem::MaybeUninit<_CK_C_INITIALIZE_ARGS> = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_C_INITIALIZE_ARGS>(), - 48usize, - concat!("Size of: ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_C_INITIALIZE_ARGS>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(CreateMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, - 8usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(DestroyMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, - 16usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(LockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, - 24usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(UnlockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 32usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(flags) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, - 40usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(pReserved) - ) - ); -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], -} -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, + ::libloading::Error, + >, + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -4064,7 +11337,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -4125,6 +11397,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -4134,7 +11431,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -4195,872 +11491,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/bindings/x86_64-apple-darwin.rs b/cryptoki-sys/src/bindings/x86_64-apple-darwin.rs index 81bdfa3d..ecfed114 100644 --- a/cryptoki-sys/src/bindings/x86_64-apple-darwin.rs +++ b/cryptoki-sys/src/bindings/x86_64-apple-darwin.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,211 +894,407 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_VERSION() { - const UNINIT: ::std::mem::MaybeUninit<_CK_VERSION> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_ATTRIBUTE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_VERSION>(), - 2usize, - concat!("Size of: ", stringify!(_CK_VERSION)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - ::std::mem::align_of::<_CK_VERSION>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_VERSION)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(major) + stringify!(type_) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, - 1usize, + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(minor) + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ATTRIBUTE), + "::", + stringify!(ulValueLen) ) ); } +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, + pub pReserved: *mut ::std::os::raw::c_void, } #[test] -fn bindgen_test_layout__CK_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_C_INITIALIZE_ARGS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_INFO>(), - 88usize, - concat!("Size of: ", stringify!(_CK_INFO)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - ::std::mem::align_of::<_CK_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_INFO)) + concat!("Alignment of ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(cryptokiVersion) + stringify!(CreateMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 2usize, + unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(manufacturerID) + stringify!(DestroyMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 40usize, + unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(flags) + stringify!(LockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, - 48usize, + unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryDescription) + stringify!(UnlockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryVersion) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_C_INITIALIZE_ARGS), + "::", + stringify!(pReserved) ) ); } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], } #[test] -fn bindgen_test_layout__CK_SLOT_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SLOT_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_DATE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SLOT_INFO>(), - 112usize, - concat!("Size of: ", stringify!(_CK_SLOT_INFO)) + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_DATE)) ); assert_eq!( - ::std::mem::align_of::<_CK_SLOT_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_SLOT_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_DATE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(slotDescription) + stringify!(year) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 64usize, + unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(manufacturerID) + stringify!(month) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, + 6usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(flags) + stringify!(day) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_DERIVED_KEY() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 104usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTemplate) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(hardwareVersion) + stringify!(pTemplate) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 106usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAttributeCount) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(firmwareVersion) + stringify!(ulAttributeCount) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DERIVED_KEY), + "::", + stringify!(phKey) ) ); } -impl Default for _CK_SLOT_INFO { +impl Default for CK_DERIVED_KEY { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -888,258 +1303,323 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, } #[test] -fn bindgen_test_layout__CK_TOKEN_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_TOKEN_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_VERSION() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_TOKEN_INFO>(), - 208usize, - concat!("Size of: ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::size_of::(), + 2usize, + concat!("Size of: ", stringify!(CK_VERSION)) ); assert_eq!( - ::std::mem::align_of::<_CK_TOKEN_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_VERSION)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(label) + stringify!(major) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, + 1usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(manufacturerID) + stringify!(minor) ) ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, - 64usize, + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(model) + stringify!(cryptokiVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 2usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(serialNumber) + stringify!(manufacturerID) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, - 104usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, + 48usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulMaxSessionCount) + stringify!(libraryDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, - 112usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, + 80usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulSessionCount) + stringify!(libraryVersion) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_INTERFACE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, - 120usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulMaxRwSessionCount) - ) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, - 128usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulRwSessionCount) - ) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, - 136usize, + unsafe { ::std::ptr::addr_of!((*ptr).pInterfaceName) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMaxPinLen) + stringify!(pInterfaceName) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, - 144usize, + unsafe { ::std::ptr::addr_of!((*ptr).pFunctionList) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMinPinLen) + stringify!(pFunctionList) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, - 152usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulTotalPublicMemory) + stringify!(flags) ) ); +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, - 160usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePublicMemory) + stringify!(mechanism) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, - 168usize, + unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulTotalPrivateMemory) + stringify!(pParameter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, - 176usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePrivateMemory) + stringify!(ulParameterLen) ) ); +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM_INFO)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 184usize, + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(hardwareVersion) + stringify!(ulMinKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 186usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(firmwareVersion) + stringify!(ulMaxKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, - 188usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(utcTime) + stringify!(flags) ) ); } -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { +pub struct CK_SESSION_INFO { pub slotID: CK_SLOT_ID, pub state: CK_STATE, pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, + pub ulDeviceError: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_SESSION_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SESSION_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SESSION_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SESSION_INFO>(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(_CK_SESSION_INFO)) + concat!("Size of: ", stringify!(CK_SESSION_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_SESSION_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_SESSION_INFO)) + concat!("Alignment of ", stringify!(CK_SESSION_INFO)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).slotID) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(slotID) ) @@ -1149,7 +1629,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(state) ) @@ -1159,7 +1639,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(flags) ) @@ -1169,71 +1649,87 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(ulDeviceError) ) ); } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, } #[test] -fn bindgen_test_layout__CK_ATTRIBUTE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_ATTRIBUTE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SLOT_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_ATTRIBUTE>(), - 24usize, - concat!("Size of: ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_ATTRIBUTE>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_ATTRIBUTE)) + concat!("Alignment of ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(type_) + stringify!(slotDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(pValue) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(ulValueLen) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(hardwareVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 106usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(firmwareVersion) ) ); } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SLOT_INFO { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1244,464 +1740,499 @@ impl Default for _CK_ATTRIBUTE { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], } #[test] -fn bindgen_test_layout__CK_DATE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_DATE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_TOKEN_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_DATE>(), - 8usize, - concat!("Size of: ", stringify!(_CK_DATE)) + ::std::mem::size_of::(), + 208usize, + concat!("Size of: ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_DATE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_DATE)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(year) + stringify!(label) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(month) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, - 6usize, + unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(day) + stringify!(model) ) ); -} -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM)) + unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(serialNumber) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(mechanism) + stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParameter) + stringify!(ulMaxSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulParameterLen) + stringify!(ulSessionCount) ) ); -} -impl Default for _CK_MECHANISM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM_INFO> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM_INFO>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM_INFO)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM_INFO)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, + 120usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMinKeySize) + stringify!(ulMaxRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, + 128usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMaxKeySize) + stringify!(ulRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, + 136usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(flags) + stringify!(ulMaxPinLen) ) ); -} -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAM() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(CK_OTP_PARAM)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAM)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, + 144usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(type_) + stringify!(ulMinPinLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, + 152usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pValue) + stringify!(ulTotalPublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, + 160usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulValueLen) + stringify!(ulFreePublicMemory) ) ); -} -impl Default for CK_OTP_PARAM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAMS() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_PARAMS)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, + 168usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(ulTotalPrivateMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, + 176usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(ulFreePrivateMemory) ) ); -} -impl Default for CK_OTP_PARAMS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) - ); assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(hardwareVersion) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 186usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(firmwareVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, + 188usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(utcTime) ) ); } -impl Default for CK_OTP_SIGNATURE_INFO { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_pss_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_AES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_pss_params)) + concat!("Alignment of ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(hashAlg) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(mgf) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(sLen) + stringify!(length) ) ); } -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_oaep_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_oaep_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_oaep_params)) + concat!("Alignment of ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(hashAlg) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(source) + stringify!(ulNonceLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(pSourceData) + stringify!(pAAD) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, 32usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(ulSourceDataLen) + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_AES_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_rsa_pkcs_oaep_params { +impl Default for CK_AES_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1712,30 +2243,30 @@ impl Default for ck_rsa_pkcs_oaep_params { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], } #[test] -fn bindgen_test_layout_ck_aes_ctr_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 24usize, - concat!("Size of: ", stringify!(ck_aes_ctr_params)) + concat!("Size of: ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_ctr_params)) + concat!("Alignment of ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(ulCounterBits) ) @@ -1745,7 +2276,7 @@ fn bindgen_test_layout_ck_aes_ctr_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(cb) ) @@ -1753,34 +2284,34 @@ fn bindgen_test_layout_ck_aes_ctr_params() { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_gcm_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 48usize, - concat!("Size of: ", stringify!(ck_gcm_params)) + concat!("Size of: ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_gcm_params)) + concat!("Alignment of ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pIv) ) @@ -1790,7 +2321,7 @@ fn bindgen_test_layout_ck_gcm_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvLen) ) @@ -1800,7 +2331,7 @@ fn bindgen_test_layout_ck_gcm_params() { 16usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvBits) ) @@ -1810,7 +2341,7 @@ fn bindgen_test_layout_ck_gcm_params() { 24usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pAAD) ) @@ -1820,7 +2351,7 @@ fn bindgen_test_layout_ck_gcm_params() { 32usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulAADLen) ) @@ -1830,13 +2361,13 @@ fn bindgen_test_layout_ck_gcm_params() { 40usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulTagBits) ) ); } -impl Default for ck_gcm_params { +impl Default for CK_AES_GCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1845,83 +2376,125 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_ecdh1_derive_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_ARIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_ecdh1_derive_params)) + concat!("Alignment of ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(kdf) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulSharedDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pSharedData) + stringify!(length) ) ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, - 24usize, +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulPublicDataLen) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pPublicData) + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) ) ); } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1931,48 +2504,145 @@ impl Default for ck_ecdh1_derive_params { } } #[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(ulCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cb) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(cb) + ) + ); +} +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_key_derivation_string_data() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_CCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(ck_key_derivation_string_data)) + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_key_derivation_string_data)) + concat!("Alignment of ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(pData) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(ulLen) + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceFixedBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).nonceGenerator) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(nonceGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMAC) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pMAC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_key_derivation_string_data { +impl Default for CK_CCM_MESSAGE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1983,58 +2653,90 @@ impl Default for ck_key_derivation_string_data { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_des_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_des_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(iv) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(length) + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2045,58 +2747,68 @@ impl Default for ck_des_cbc_encrypt_data_params { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_aes_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CHACHA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Size of: ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(iv) + stringify!(pBlockCounter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).blockCounterBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CHACHA20_PARAMS), + "::", + stringify!(blockCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(length) + stringify!(ulNonceBits) ) ); } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_CHACHA20_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2105,478 +2817,7027 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_Initialize = - ::std::option::Option CK_RV>; -pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; -pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, ->; -pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismList = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismInfo = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, - ) -> CK_RV, ->; -pub type CK_C_InitToken = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, - ) -> CK_RV, ->; -pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_OpenSession = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; -pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; -pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, ->; -pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_Login = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_Logout = - ::std::option::Option CK_RV>; -pub type CK_C_CreateObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CopyObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, ->; -pub type CK_C_GetObjectSize = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjects = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; -pub type CK_C_EncryptInit = ::std::option::Option< +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CMS_SIG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).certificateHandle) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(certificateHandle) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSigningMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pSigningMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDigestMechanism) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pDigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContentType) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pContentType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequestedAttributes) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequestedAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequestedAttributesLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequestedAttributesLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequiredAttributes) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequiredAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequiredAttributesLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequiredAttributesLen) + ) + ); +} +impl Default for CK_CMS_SIG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DSA_PARAMETER_GEN_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(hash) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIndex) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulIndex) + ) + ); +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pSharedData) + ) + ); +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_ECMQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_EDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phFlag) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(phFlag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(ulContextDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(pContextData) + ) + ); +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvFixedBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ivGenerator) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ivGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pTag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pWrapOID) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pWrapOID) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWrapOIDLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulWrapOIDLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(hKey) + ) + ); +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_HKDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExtract) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExtract) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExpand) as usize - ptr as usize }, + 1usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExpand) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltType) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hSaltKey) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(hSaltKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulInfoLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulInfoLen) + ) + ); +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_KEA_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).isSender) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(isSender) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomA) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomB) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomB) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_DERIVATION_STRING_DATA() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(ulLen) + ) + ); +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_WRAP_SET_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bBC) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(bBC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(pX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulXLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(ulXLen) + ) + ); +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KIP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PBE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitVector) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pInitVector) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIteration) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulIteration) + ) + ); +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS2() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PRF_DATA_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[test] +fn bindgen_test_layout_CK_RC2_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(iv) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC2_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulRounds) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +#[test] +fn bindgen_test_layout_CK_RSA_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOAEPParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pOAEPParams) + ) + ); +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(source) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(pSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(ulSourceDataLen) + ) + ); +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_PSS_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(sLen) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!( + "Size of: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pTag) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pBlockCounter) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(ulNonceBits) + ) + ); +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SEED_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_PRIVATE_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPAndGLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPAndGLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulQLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulQLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrimeP) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPrimeP) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBaseG) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pBaseG) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSubprimeQ) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pSubprimeQ) + ) + ); +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_RELAYX_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldWrappedXLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldWrappedXLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldWrappedX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldWrappedX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPassword) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPassword) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPublicDataLen) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPublicData) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewRandomLen) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewRandomA) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewRandomA) + ) + ); +} +impl Default for CK_SKIPJACK_RELAYX_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_COUNTER_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_DKM_LENGTH_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).dkmLengthMethod) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(dkmLengthMethod) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_FEEDBACK_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulIVLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pIV) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_INITIALIZE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).initiator_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(initiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_INITIATE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_prekey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_signature) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPrekey_signature) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_key) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOnetime_key) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_identity) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_ephemeral) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_ephemeral) + ) + ); +} +impl Default for CK_X3DH_INITIATE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIdentity_id) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pIdentity_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_id) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pPrekey_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_id) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pOnetime_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_identity) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_ephemeral) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_ephemeral) + ) + ); +} +impl Default for CK_X3DH_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_MQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).OtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(OtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, +} +#[test] +fn bindgen_test_layout_CK_XEDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_XEDDSA_PARAMS), + "::", + stringify!(hash) + ) + ); +} +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerMacSecret) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerKey) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVClient) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVClient) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVServer) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVServer) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SSL3_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_SSL3_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(prfMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulLabelLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pContextData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLength) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulContextDataLength) + ) + ); +} +impl Default for CK_TLS_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_MAC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerOrClient) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulServerOrClient) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_TLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(pIV) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSequenceNumber) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulSequenceNumber) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_WTLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +pub type CK_C_Initialize = + ::std::option::Option CK_RV>; +pub type CK_C_Finalize = + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; +pub type CK_C_GetSlotList = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; +pub type CK_C_GetTokenInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, +>; +pub type CK_C_GetMechanismList = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetMechanismInfo = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, + ) -> CK_RV, +>; +pub type CK_C_InitToken = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + ) -> CK_RV, +>; +pub type CK_C_InitPIN = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetPIN = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_OpenSession = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CloseSession = + ::std::option::Option CK_RV>; +pub type CK_C_CloseAllSessions = + ::std::option::Option CK_RV>; +pub type CK_C_GetSessionInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, +>; +pub type CK_C_GetOperationState = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetOperationState = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_Login = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_Logout = + ::std::option::Option CK_RV>; +pub type CK_C_CreateObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CopyObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DestroyObject = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, +>; +pub type CK_C_GetObjectSize = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsInit = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_FindObjects = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsFinal = + ::std::option::Option CK_RV>; +pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Sign = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SignFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SignRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Verify = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_VerifyRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptDigestUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_UnwrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DeriveKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; +pub type CK_C_LoginUser = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, +} +#[test] +fn bindgen_test_layout_CK_FUNCTION_LIST_3_0() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 744usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(version) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Initialize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Finalize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetTokenInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitToken) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_OpenSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, + 112usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseAllSessions) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, + 128usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSessionInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, + 144usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, + 152usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Login) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, + 160usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Logout) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, + 168usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CreateObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, + 176usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CopyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DestroyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, + 192usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetObjectSize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, + 200usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, + 208usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, + 216usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, + 224usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjects) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, + 232usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, + 240usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, + 248usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Encrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, + 256usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, + 264usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, + 272usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, + 280usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Decrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, + 288usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, + 296usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, + 304usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, + 312usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Digest) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, + 320usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, + 328usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, + 336usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, + 344usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, + 352usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Sign) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, + 360usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, + 368usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, + 376usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, + 384usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, + 392usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, + 400usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Verify) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, + 408usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, + 416usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, + 424usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, + 432usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, + 440usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, + 448usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptDigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, + 456usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, + 464usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptVerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, + 472usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, + 480usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKeyPair) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, + 488usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, + 496usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_UnwrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, + 504usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DeriveKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, + 512usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SeedRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, + 520usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, + 528usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionStatus) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, + 536usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CancelFunction) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, + 544usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WaitForSlotEvent) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterfaceList) as usize - ptr as usize }, + 552usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterfaceList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterface) as usize - ptr as usize }, + 560usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterface) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_LoginUser) as usize - ptr as usize }, + 568usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_LoginUser) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SessionCancel) as usize - ptr as usize }, + 576usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SessionCancel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptInit) as usize - ptr as usize }, + 584usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessage) as usize - ptr as usize }, + 592usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageBegin) as usize - ptr as usize }, + 600usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageNext) as usize - ptr as usize }, + 608usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptFinal) as usize - ptr as usize }, + 616usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptInit) as usize - ptr as usize }, + 624usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessage) as usize - ptr as usize }, + 632usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageBegin) as usize - ptr as usize }, + 640usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageNext) as usize - ptr as usize }, + 648usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptFinal) as usize - ptr as usize }, + 656usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignInit) as usize - ptr as usize }, + 664usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessage) as usize - ptr as usize }, + 672usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageBegin) as usize - ptr as usize }, + 680usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageNext) as usize - ptr as usize }, + 688usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignFinal) as usize - ptr as usize }, + 696usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyInit) as usize - ptr as usize }, + 704usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessage) as usize - ptr as usize }, + 712usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageBegin) as usize - ptr as usize }, + 720usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageNext) as usize - ptr as usize }, + 728usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyFinal) as usize - ptr as usize }, + 736usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyFinal) + ) + ); +} #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -2647,25 +9908,25 @@ pub struct _CK_FUNCTION_LIST { pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } #[test] -fn bindgen_test_layout__CK_FUNCTION_LIST() { - const UNINIT: ::std::mem::MaybeUninit<_CK_FUNCTION_LIST> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_FUNCTION_LIST() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_FUNCTION_LIST>(), + ::std::mem::size_of::(), 552usize, - concat!("Size of: ", stringify!(_CK_FUNCTION_LIST)) + concat!("Size of: ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( - ::std::mem::align_of::<_CK_FUNCTION_LIST>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_FUNCTION_LIST)) + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(version) ) @@ -2675,7 +9936,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Initialize) ) @@ -2685,7 +9946,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Finalize) ) @@ -2695,7 +9956,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetInfo) ) @@ -2705,7 +9966,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 32usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionList) ) @@ -2715,7 +9976,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 40usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotList) ) @@ -2725,7 +9986,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 48usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotInfo) ) @@ -2735,7 +9996,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 56usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetTokenInfo) ) @@ -2745,7 +10006,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 64usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismList) ) @@ -2755,7 +10016,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 72usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismInfo) ) @@ -2765,7 +10026,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 80usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitToken) ) @@ -2775,7 +10036,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 88usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitPIN) ) @@ -2785,7 +10046,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 96usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetPIN) ) @@ -2795,7 +10056,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 104usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_OpenSession) ) @@ -2805,7 +10066,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 112usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseSession) ) @@ -2815,7 +10076,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 120usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseAllSessions) ) @@ -2825,7 +10086,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 128usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSessionInfo) ) @@ -2835,7 +10096,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 136usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetOperationState) ) @@ -2845,7 +10106,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 144usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetOperationState) ) @@ -2855,7 +10116,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 152usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Login) ) @@ -2865,7 +10126,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 160usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Logout) ) @@ -2875,7 +10136,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 168usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CreateObject) ) @@ -2885,7 +10146,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 176usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CopyObject) ) @@ -2895,7 +10156,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 184usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DestroyObject) ) @@ -2905,7 +10166,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 192usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetObjectSize) ) @@ -2915,7 +10176,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 200usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetAttributeValue) ) @@ -2925,7 +10186,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 208usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetAttributeValue) ) @@ -2935,7 +10196,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 216usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsInit) ) @@ -2945,7 +10206,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 224usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjects) ) @@ -2955,7 +10216,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 232usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsFinal) ) @@ -2965,7 +10226,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 240usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptInit) ) @@ -2975,7 +10236,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 248usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Encrypt) ) @@ -2985,7 +10246,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 256usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptUpdate) ) @@ -2995,7 +10256,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 264usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptFinal) ) @@ -3005,7 +10266,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 272usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptInit) ) @@ -3015,7 +10276,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 280usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Decrypt) ) @@ -3025,7 +10286,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 288usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptUpdate) ) @@ -3035,7 +10296,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 296usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptFinal) ) @@ -3045,7 +10306,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 304usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestInit) ) @@ -3055,7 +10316,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 312usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Digest) ) @@ -3065,7 +10326,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 320usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestUpdate) ) @@ -3075,7 +10336,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 328usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestKey) ) @@ -3085,7 +10346,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 336usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestFinal) ) @@ -3095,7 +10356,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 344usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignInit) ) @@ -3105,7 +10366,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 352usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Sign) ) @@ -3115,7 +10376,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 360usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignUpdate) ) @@ -3125,7 +10386,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 368usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignFinal) ) @@ -3135,7 +10396,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 376usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecoverInit) ) @@ -3145,7 +10406,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 384usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecover) ) @@ -3155,7 +10416,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 392usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyInit) ) @@ -3165,7 +10426,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 400usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Verify) ) @@ -3175,7 +10436,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 408usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyUpdate) ) @@ -3185,7 +10446,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 416usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyFinal) ) @@ -3195,7 +10456,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 424usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecoverInit) ) @@ -3205,7 +10466,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 432usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecover) ) @@ -3215,7 +10476,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 440usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestEncryptUpdate) ) @@ -3225,7 +10486,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 448usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptDigestUpdate) ) @@ -3235,7 +10496,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 456usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignEncryptUpdate) ) @@ -3245,7 +10506,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 464usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptVerifyUpdate) ) @@ -3255,7 +10516,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 472usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKey) ) @@ -3265,7 +10526,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 480usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKeyPair) ) @@ -3275,7 +10536,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 488usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WrapKey) ) @@ -3285,7 +10546,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 496usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_UnwrapKey) ) @@ -3295,7 +10556,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 504usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DeriveKey) ) @@ -3305,7 +10566,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 512usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SeedRandom) ) @@ -3315,7 +10576,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 520usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateRandom) ) @@ -3325,7 +10586,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 528usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionStatus) ) @@ -3335,7 +10596,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 536usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CancelFunction) ) @@ -3345,704 +10606,716 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 544usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WaitForSlotEvent) ) ); } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -#[test] -fn bindgen_test_layout__CK_C_INITIALIZE_ARGS() { - const UNINIT: ::std::mem::MaybeUninit<_CK_C_INITIALIZE_ARGS> = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_C_INITIALIZE_ARGS>(), - 48usize, - concat!("Size of: ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_C_INITIALIZE_ARGS>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(CreateMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, - 8usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(DestroyMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, - 16usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(LockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, - 24usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(UnlockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 32usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(flags) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, - 40usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(pReserved) - ) - ); -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], -} -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, + ::libloading::Error, + >, + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -4064,7 +11337,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -4125,6 +11397,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -4134,7 +11431,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -4195,872 +11491,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/bindings/x86_64-pc-windows-msvc.rs b/cryptoki-sys/src/bindings/x86_64-pc-windows-msvc.rs index ed9d0b5b..f5b0cedc 100644 --- a/cryptoki-sys/src/bindings/x86_64-pc-windows-msvc.rs +++ b/cryptoki-sys/src/bindings/x86_64-pc-windows-msvc.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,211 +894,407 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_VERSION() { - const UNINIT: ::std::mem::MaybeUninit<_CK_VERSION> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_ATTRIBUTE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_VERSION>(), - 2usize, - concat!("Size of: ", stringify!(_CK_VERSION)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - ::std::mem::align_of::<_CK_VERSION>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_VERSION)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(major) + stringify!(type_) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, - 1usize, + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(minor) + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ATTRIBUTE), + "::", + stringify!(ulValueLen) ) ); } -#[repr(C, packed)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, + pub pReserved: *mut ::std::os::raw::c_void, } #[test] -fn bindgen_test_layout__CK_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_C_INITIALIZE_ARGS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_INFO>(), - 72usize, - concat!("Size of: ", stringify!(_CK_INFO)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - ::std::mem::align_of::<_CK_INFO>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_INFO)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(cryptokiVersion) + stringify!(CreateMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 2usize, + unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(manufacturerID) + stringify!(DestroyMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 34usize, + unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(flags) + stringify!(LockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, - 38usize, + unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryDescription) + stringify!(UnlockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, - 70usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryVersion) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_C_INITIALIZE_ARGS), + "::", + stringify!(pReserved) ) ); } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; -#[repr(C, packed)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], } #[test] -fn bindgen_test_layout__CK_SLOT_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SLOT_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_DATE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SLOT_INFO>(), - 104usize, - concat!("Size of: ", stringify!(_CK_SLOT_INFO)) + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_DATE)) ); assert_eq!( - ::std::mem::align_of::<_CK_SLOT_INFO>(), + ::std::mem::align_of::(), 1usize, - concat!("Alignment of ", stringify!(_CK_SLOT_INFO)) + concat!("Alignment of ", stringify!(CK_DATE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(slotDescription) + stringify!(year) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 64usize, + unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(manufacturerID) + stringify!(month) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, + 6usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(flags) + stringify!(day) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_DERIVED_KEY() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DERIVED_KEY)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 100usize, + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTemplate) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(hardwareVersion) + stringify!(pTemplate) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 102usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAttributeCount) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(firmwareVersion) + stringify!(ulAttributeCount) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DERIVED_KEY), + "::", + stringify!(phKey) ) ); } -impl Default for _CK_SLOT_INFO { +impl Default for CK_DERIVED_KEY { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -888,258 +1303,323 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; -#[repr(C, packed)] +#[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, } #[test] -fn bindgen_test_layout__CK_TOKEN_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_TOKEN_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_VERSION() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_TOKEN_INFO>(), - 160usize, - concat!("Size of: ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::size_of::(), + 2usize, + concat!("Size of: ", stringify!(CK_VERSION)) ); assert_eq!( - ::std::mem::align_of::<_CK_TOKEN_INFO>(), + ::std::mem::align_of::(), 1usize, - concat!("Alignment of ", stringify!(_CK_TOKEN_INFO)) + concat!("Alignment of ", stringify!(CK_VERSION)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(label) + stringify!(major) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, + 1usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(manufacturerID) + stringify!(minor) ) ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, - 64usize, - concat!( +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 76usize, + concat!("Size of: ", stringify!(CK_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + 0usize, + concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(model) + stringify!(cryptokiVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 2usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(serialNumber) + stringify!(manufacturerID) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + 36usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, - 100usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulMaxSessionCount) + stringify!(libraryDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, - 104usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, + 72usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulSessionCount) + stringify!(libraryVersion) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_INTERFACE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, - 108usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulMaxRwSessionCount) - ) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, - 112usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulRwSessionCount) - ) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, - 116usize, + unsafe { ::std::ptr::addr_of!((*ptr).pInterfaceName) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMaxPinLen) + stringify!(pInterfaceName) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, - 120usize, + unsafe { ::std::ptr::addr_of!((*ptr).pFunctionList) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMinPinLen) + stringify!(pFunctionList) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, - 124usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulTotalPublicMemory) + stringify!(flags) ) ); +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, - 128usize, + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePublicMemory) + stringify!(mechanism) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, - 132usize, + unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulTotalPrivateMemory) + stringify!(pParameter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, - 136usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePrivateMemory) + stringify!(ulParameterLen) ) ); +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_MECHANISM_INFO)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 140usize, + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_MECHANISM_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(hardwareVersion) + stringify!(ulMinKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 142usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(firmwareVersion) + stringify!(ulMaxKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, - 144usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(utcTime) + stringify!(flags) ) ); } -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; -#[repr(C, packed)] +#[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { +pub struct CK_SESSION_INFO { pub slotID: CK_SLOT_ID, pub state: CK_STATE, pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, + pub ulDeviceError: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_SESSION_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SESSION_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SESSION_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SESSION_INFO>(), + ::std::mem::size_of::(), 16usize, - concat!("Size of: ", stringify!(_CK_SESSION_INFO)) + concat!("Size of: ", stringify!(CK_SESSION_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_SESSION_INFO>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_SESSION_INFO)) + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SESSION_INFO)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).slotID) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(slotID) ) @@ -1149,7 +1629,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 4usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(state) ) @@ -1159,7 +1639,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(flags) ) @@ -1169,71 +1649,87 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 12usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(ulDeviceError) ) ); } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; -#[repr(C, packed)] +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, } #[test] -fn bindgen_test_layout__CK_ATTRIBUTE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_ATTRIBUTE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SLOT_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_ATTRIBUTE>(), - 16usize, - concat!("Size of: ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::size_of::(), + 104usize, + concat!("Size of: ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_ATTRIBUTE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(type_) + stringify!(slotDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(pValue) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 12usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(ulValueLen) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 100usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(hardwareVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 102usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(firmwareVersion) ) ); } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SLOT_INFO { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1244,325 +1740,405 @@ impl Default for _CK_ATTRIBUTE { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], } #[test] -fn bindgen_test_layout__CK_DATE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_DATE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_TOKEN_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_DATE>(), - 8usize, - concat!("Size of: ", stringify!(_CK_DATE)) + ::std::mem::size_of::(), + 160usize, + concat!("Size of: ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_DATE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_DATE)) + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(year) + stringify!(label) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(month) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, - 6usize, + unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(day) + stringify!(model) ) ); -} -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; -#[repr(C, packed)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM>(), - 16usize, - concat!("Size of: ", stringify!(_CK_MECHANISM)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM)) + unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(serialNumber) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(mechanism) + stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, + 100usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParameter) + stringify!(ulMaxSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, - 12usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulParameterLen) + stringify!(ulSessionCount) ) ); -} -impl Default for _CK_MECHANISM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C, packed)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM_INFO> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM_INFO>(), - 12usize, - concat!("Size of: ", stringify!(_CK_MECHANISM_INFO)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM_INFO>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM_INFO)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, + 108usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMinKeySize) + stringify!(ulMaxRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMaxKeySize) + stringify!(ulRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, + 116usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(flags) + stringify!(ulMaxPinLen) ) ); -} -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; -#[repr(C, packed)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAM() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_PARAM)) - ); assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(ulMinPinLen) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, + 124usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(type_) + stringify!(ulTotalPublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, + 128usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pValue) + stringify!(ulFreePublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 12usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, + 132usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulValueLen) + stringify!(ulTotalPrivateMemory) ) ); -} -impl Default for CK_OTP_PARAM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C, packed)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAMS() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 12usize, - concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(ulFreePrivateMemory) + ) ); assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 140usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(hardwareVersion) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 142usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(firmwareVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, + 144usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(utcTime) ) ); } -impl Default for CK_OTP_PARAMS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], } -#[repr(C, packed)] +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_AES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 12usize, - concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pParams) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulCount) + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) ) ); } -impl Default for CK_OTP_SIGNATURE_INFO { +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1571,137 +2147,92 @@ impl Default for CK_OTP_SIGNATURE_INFO { } } } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; -#[repr(C, packed)] -#[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_pss_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 12usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), - "::", - stringify!(hashAlg) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 4usize, - concat!( - "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), - "::", - stringify!(sLen) - ) - ); -} -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; -#[repr(C, packed)] -#[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_ck_rsa_pkcs_oaep_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_oaep_params)) - ); - assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_oaep_params)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(hashAlg) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(ulNonceLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(source) + stringify!(pAAD) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, - 12usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(pSourceData) + stringify!(ulAADLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, - 20usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 36usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(ulSourceDataLen) + stringify!(ulMACLen) ) ); } -impl Default for ck_rsa_pkcs_oaep_params { +impl Default for CK_AES_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1710,32 +2241,32 @@ impl Default for ck_rsa_pkcs_oaep_params { } } } -#[repr(C, packed)] +#[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], } #[test] -fn bindgen_test_layout_ck_aes_ctr_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 20usize, - concat!("Size of: ", stringify!(ck_aes_ctr_params)) + concat!("Size of: ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(ck_aes_ctr_params)) + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(ulCounterBits) ) @@ -1745,42 +2276,42 @@ fn bindgen_test_layout_ck_aes_ctr_params() { 4usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(cb) ) ); } -#[repr(C, packed)] +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_gcm_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(ck_gcm_params)) + concat!("Size of: ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(ck_gcm_params)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pIv) ) @@ -1790,7 +2321,7 @@ fn bindgen_test_layout_ck_gcm_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvLen) ) @@ -1800,7 +2331,7 @@ fn bindgen_test_layout_ck_gcm_params() { 12usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvBits) ) @@ -1810,7 +2341,7 @@ fn bindgen_test_layout_ck_gcm_params() { 16usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pAAD) ) @@ -1820,7 +2351,7 @@ fn bindgen_test_layout_ck_gcm_params() { 24usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulAADLen) ) @@ -1830,13 +2361,13 @@ fn bindgen_test_layout_ck_gcm_params() { 28usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulTagBits) ) ); } -impl Default for ck_gcm_params { +impl Default for CK_AES_GCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1845,83 +2376,125 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; -#[repr(C, packed)] +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_ecdh1_derive_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_ARIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 28usize, - concat!("Size of: ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(kdf) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulSharedDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), 8usize, + concat!( + "Alignment of ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pSharedData) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulPublicDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, - 20usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pPublicData) + stringify!(length) ) ); } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1930,49 +2503,146 @@ impl Default for ck_ecdh1_derive_params { } } } -#[repr(C, packed)] +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 20usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(ulCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cb) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(cb) + ) + ); +} +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_key_derivation_string_data() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_CCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 12usize, - concat!("Size of: ", stringify!(ck_key_derivation_string_data)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(ck_key_derivation_string_data)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(pData) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(ulLen) + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceFixedBits) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).nonceGenerator) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(nonceGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMAC) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pMAC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_key_derivation_string_data { +impl Default for CK_CCM_MESSAGE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1981,60 +2651,92 @@ impl Default for ck_key_derivation_string_data { } } } -#[repr(C, packed)] +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_des_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 20usize, - concat!("Size of: ", stringify!(ck_des_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(ck_des_cbc_encrypt_data_params)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(iv) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(length) + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2043,60 +2745,70 @@ impl Default for ck_des_cbc_encrypt_data_params { } } } -#[repr(C, packed)] +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_aes_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CHACHA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 28usize, - concat!("Size of: ", stringify!(ck_aes_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), - 1usize, - concat!("Alignment of ", stringify!(ck_aes_cbc_encrypt_data_params)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(iv) + stringify!(pBlockCounter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).blockCounterBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CHACHA20_PARAMS), + "::", + stringify!(blockCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(length) + stringify!(ulNonceBits) ) ); } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_CHACHA20_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2105,478 +2817,7027 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_Initialize = - ::std::option::Option CK_RV>; -pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; -pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, ->; -pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismList = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismInfo = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, - ) -> CK_RV, ->; -pub type CK_C_InitToken = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, - ) -> CK_RV, ->; -pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_OpenSession = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; -pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; -pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, ->; -pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_Login = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_Logout = - ::std::option::Option CK_RV>; -pub type CK_C_CreateObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CopyObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, ->; -pub type CK_C_GetObjectSize = ::std::option::Option< +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CMS_SIG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).certificateHandle) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(certificateHandle) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSigningMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pSigningMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDigestMechanism) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pDigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContentType) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pContentType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequestedAttributes) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequestedAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequestedAttributesLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequestedAttributesLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequiredAttributes) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequiredAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequiredAttributesLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequiredAttributesLen) + ) + ); +} +impl Default for CK_CMS_SIG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DSA_PARAMETER_GEN_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(hash) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIndex) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulIndex) + ) + ); +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pSharedData) + ) + ); +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_ECMQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_EDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phFlag) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(phFlag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(ulContextDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(pContextData) + ) + ); +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvFixedBits) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ivGenerator) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ivGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pTag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvBits) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pWrapOID) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pWrapOID) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWrapOIDLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulWrapOIDLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(hKey) + ) + ); +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_HKDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExtract) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExtract) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExpand) as usize - ptr as usize }, + 1usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExpand) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltType) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hSaltKey) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(hSaltKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulInfoLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulInfoLen) + ) + ); +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_KEA_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).isSender) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(isSender) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomA) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomB) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomB) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_DERIVATION_STRING_DATA() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(ulLen) + ) + ); +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_WRAP_SET_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bBC) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(bBC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(pX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulXLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(ulXLen) + ) + ); +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KIP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PBE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitVector) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pInitVector) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIteration) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulIteration) + ) + ); +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS2() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PRF_DATA_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[test] +fn bindgen_test_layout_CK_RC2_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(iv) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC2_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulRounds) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +#[test] +fn bindgen_test_layout_CK_RSA_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOAEPParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pOAEPParams) + ) + ); +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(source) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(pSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(ulSourceDataLen) + ) + ); +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_PSS_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(sLen) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!( + "Size of: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pTag) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pBlockCounter) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(ulNonceBits) + ) + ); +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SEED_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_PRIVATE_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPAndGLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPAndGLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulQLen) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulQLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRandomA) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrimeP) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPrimeP) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBaseG) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pBaseG) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSubprimeQ) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pSubprimeQ) + ) + ); +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_RELAYX_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldWrappedXLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldWrappedXLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldWrappedX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldWrappedX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPassword) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPassword) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPublicDataLen) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPublicData) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewRandomLen) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewRandomA) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewRandomA) + ) + ); +} +impl Default for CK_SKIPJACK_RELAYX_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_COUNTER_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_DKM_LENGTH_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).dkmLengthMethod) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(dkmLengthMethod) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_FEEDBACK_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulIVLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pIV) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_INITIALIZE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_identity) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).initiator_identity) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(initiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 28usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_INITIATE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_identity) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_signature) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPrekey_signature) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_key) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOnetime_key) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_identity) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_ephemeral) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_ephemeral) + ) + ); +} +impl Default for CK_X3DH_INITIATE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIdentity_id) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pIdentity_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_id) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pPrekey_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_id) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pOnetime_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_identity) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_ephemeral) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_ephemeral) + ) + ); +} +impl Default for CK_X3DH_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_MQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).OtherInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(OtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 36usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData2) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, +} +#[test] +fn bindgen_test_layout_CK_XEDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 4usize, + concat!("Size of: ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_XEDDSA_PARAMS), + "::", + stringify!(hash) + ) + ); +} +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerMacSecret) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerKey) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVClient) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVClient) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVServer) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVServer) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SSL3_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_SSL3_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(prfMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulLabelLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pContextData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLength) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulContextDataLength) + ) + ); +} +impl Default for CK_TLS_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_MAC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 12usize, + concat!("Size of: ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 4usize, + concat!("Alignment of ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerOrClient) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulServerOrClient) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_TLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(pIV) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 4usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 12usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSequenceNumber) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulSequenceNumber) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 20usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_WTLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +pub type CK_C_Initialize = + ::std::option::Option CK_RV>; +pub type CK_C_Finalize = + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; +pub type CK_C_GetSlotList = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; +pub type CK_C_GetTokenInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, +>; +pub type CK_C_GetMechanismList = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetMechanismInfo = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, + ) -> CK_RV, +>; +pub type CK_C_InitToken = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + ) -> CK_RV, +>; +pub type CK_C_InitPIN = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetPIN = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_OpenSession = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CloseSession = + ::std::option::Option CK_RV>; +pub type CK_C_CloseAllSessions = + ::std::option::Option CK_RV>; +pub type CK_C_GetSessionInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, +>; +pub type CK_C_GetOperationState = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetOperationState = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_Login = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_Logout = + ::std::option::Option CK_RV>; +pub type CK_C_CreateObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CopyObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DestroyObject = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, +>; +pub type CK_C_GetObjectSize = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GetAttributeValue = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_SetAttributeValue = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, >; pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_FindObjects = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; + ::std::option::Option CK_RV>; pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Sign = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SignFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SignRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Verify = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_VerifyRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptDigestUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_UnwrapKey = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DeriveKey = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< + unsafe extern "C" fn( + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_LoginUser = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, >; -pub type CK_C_UnwrapKey = ::std::option::Option< +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; -pub type CK_C_DeriveKey = ::std::option::Option< +pub type CK_C_VerifyMessage = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, >; -pub type CK_C_SeedRandom = ::std::option::Option< +pub type CK_C_VerifyMessageBegin = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_VerifyMessageNext = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; -#[repr(C, packed)] +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, +} +#[test] +fn bindgen_test_layout_CK_FUNCTION_LIST_3_0() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 744usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(version) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Initialize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Finalize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetTokenInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitToken) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_OpenSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, + 112usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseAllSessions) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, + 128usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSessionInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, + 144usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, + 152usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Login) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, + 160usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Logout) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, + 168usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CreateObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, + 176usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CopyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DestroyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, + 192usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetObjectSize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, + 200usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, + 208usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, + 216usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, + 224usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjects) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, + 232usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, + 240usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, + 248usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Encrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, + 256usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, + 264usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, + 272usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, + 280usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Decrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, + 288usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, + 296usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, + 304usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, + 312usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Digest) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, + 320usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, + 328usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, + 336usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, + 344usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, + 352usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Sign) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, + 360usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, + 368usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, + 376usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, + 384usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, + 392usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, + 400usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Verify) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, + 408usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, + 416usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, + 424usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, + 432usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, + 440usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, + 448usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptDigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, + 456usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, + 464usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptVerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, + 472usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, + 480usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKeyPair) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, + 488usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, + 496usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_UnwrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, + 504usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DeriveKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, + 512usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SeedRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, + 520usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, + 528usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionStatus) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, + 536usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CancelFunction) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, + 544usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WaitForSlotEvent) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterfaceList) as usize - ptr as usize }, + 552usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterfaceList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterface) as usize - ptr as usize }, + 560usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterface) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_LoginUser) as usize - ptr as usize }, + 568usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_LoginUser) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SessionCancel) as usize - ptr as usize }, + 576usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SessionCancel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptInit) as usize - ptr as usize }, + 584usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessage) as usize - ptr as usize }, + 592usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageBegin) as usize - ptr as usize }, + 600usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageNext) as usize - ptr as usize }, + 608usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptFinal) as usize - ptr as usize }, + 616usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptInit) as usize - ptr as usize }, + 624usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessage) as usize - ptr as usize }, + 632usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageBegin) as usize - ptr as usize }, + 640usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageNext) as usize - ptr as usize }, + 648usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptFinal) as usize - ptr as usize }, + 656usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignInit) as usize - ptr as usize }, + 664usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessage) as usize - ptr as usize }, + 672usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageBegin) as usize - ptr as usize }, + 680usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageNext) as usize - ptr as usize }, + 688usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignFinal) as usize - ptr as usize }, + 696usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyInit) as usize - ptr as usize }, + 704usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessage) as usize - ptr as usize }, + 712usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageBegin) as usize - ptr as usize }, + 720usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageNext) as usize - ptr as usize }, + 728usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyFinal) as usize - ptr as usize }, + 736usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyFinal) + ) + ); +} +#[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -2647,1402 +9908,1414 @@ pub struct _CK_FUNCTION_LIST { pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } #[test] -fn bindgen_test_layout__CK_FUNCTION_LIST() { - const UNINIT: ::std::mem::MaybeUninit<_CK_FUNCTION_LIST> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_FUNCTION_LIST() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_FUNCTION_LIST>(), - 546usize, - concat!("Size of: ", stringify!(_CK_FUNCTION_LIST)) + ::std::mem::size_of::(), + 552usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( - ::std::mem::align_of::<_CK_FUNCTION_LIST>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_FUNCTION_LIST)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(version) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, - 2usize, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Initialize) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, - 10usize, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Finalize) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, - 18usize, + 24usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetInfo) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, - 26usize, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionList) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, - 34usize, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotList) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, - 42usize, + 48usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotInfo) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, - 50usize, + 56usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetTokenInfo) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, - 58usize, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismList) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, - 66usize, + 72usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismInfo) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, - 74usize, + 80usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitToken) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, - 82usize, + 88usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitPIN) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, - 90usize, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetPIN) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, - 98usize, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_OpenSession) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, - 106usize, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseSession) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, - 114usize, + 120usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseAllSessions) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, - 122usize, + 128usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSessionInfo) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, - 130usize, + 136usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetOperationState) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, - 138usize, + 144usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetOperationState) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, - 146usize, + 152usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Login) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, - 154usize, + 160usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Logout) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, - 162usize, + 168usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CreateObject) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, - 170usize, + 176usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CopyObject) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, - 178usize, + 184usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DestroyObject) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, - 186usize, + 192usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetObjectSize) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, - 194usize, + 200usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetAttributeValue) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, - 202usize, + 208usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetAttributeValue) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, - 210usize, + 216usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsInit) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, - 218usize, + 224usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjects) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, - 226usize, + 232usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsFinal) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, - 234usize, + 240usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptInit) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, - 242usize, + 248usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Encrypt) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, - 250usize, + 256usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptUpdate) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, - 258usize, + 264usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptFinal) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, - 266usize, + 272usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptInit) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, - 274usize, + 280usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Decrypt) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, - 282usize, + 288usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptUpdate) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, - 290usize, + 296usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptFinal) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, - 298usize, + 304usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestInit) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, - 306usize, + 312usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Digest) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, - 314usize, + 320usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestUpdate) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, - 322usize, + 328usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestKey) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, - 330usize, + 336usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestFinal) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, - 338usize, + 344usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignInit) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, - 346usize, + 352usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Sign) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, - 354usize, + 360usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignUpdate) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, - 362usize, + 368usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignFinal) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, - 370usize, + 376usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecoverInit) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, - 378usize, + 384usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecover) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, - 386usize, + 392usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyInit) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, - 394usize, + 400usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Verify) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, - 402usize, + 408usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyUpdate) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, - 410usize, + 416usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyFinal) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, - 418usize, + 424usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecoverInit) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, - 426usize, + 432usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecover) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, - 434usize, + 440usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestEncryptUpdate) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, - 442usize, + 448usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptDigestUpdate) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, - 450usize, + 456usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignEncryptUpdate) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, - 458usize, + 464usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptVerifyUpdate) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, - 466usize, + 472usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKey) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, - 474usize, + 480usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKeyPair) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, - 482usize, + 488usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WrapKey) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, - 490usize, + 496usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_UnwrapKey) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, - 498usize, + 504usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DeriveKey) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, - 506usize, + 512usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SeedRandom) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, - 514usize, + 520usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateRandom) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, - 522usize, + 528usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionStatus) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, - 530usize, + 536usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CancelFunction) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, - 538usize, + 544usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WaitForSlotEvent) ) ); } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C, packed)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -#[test] -fn bindgen_test_layout__CK_C_INITIALIZE_ARGS() { - const UNINIT: ::std::mem::MaybeUninit<_CK_C_INITIALIZE_ARGS> = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_C_INITIALIZE_ARGS>(), - 44usize, - concat!("Size of: ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_C_INITIALIZE_ARGS>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(CreateMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, - 8usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(DestroyMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, - 16usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(LockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, - 24usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(UnlockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 32usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(flags) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, - 36usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(pReserved) - ) - ); -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], -} -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, + ::libloading::Error, + >, + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -4064,7 +11337,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -4125,6 +11397,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -4134,7 +11431,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -4195,872 +11491,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/bindings/x86_64-unknown-freebsd.rs b/cryptoki-sys/src/bindings/x86_64-unknown-freebsd.rs index 81bdfa3d..ecfed114 100644 --- a/cryptoki-sys/src/bindings/x86_64-unknown-freebsd.rs +++ b/cryptoki-sys/src/bindings/x86_64-unknown-freebsd.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,211 +894,407 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_VERSION() { - const UNINIT: ::std::mem::MaybeUninit<_CK_VERSION> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_ATTRIBUTE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_VERSION>(), - 2usize, - concat!("Size of: ", stringify!(_CK_VERSION)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - ::std::mem::align_of::<_CK_VERSION>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_VERSION)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(major) + stringify!(type_) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, - 1usize, + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(minor) + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ATTRIBUTE), + "::", + stringify!(ulValueLen) ) ); } +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, + pub pReserved: *mut ::std::os::raw::c_void, } #[test] -fn bindgen_test_layout__CK_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_C_INITIALIZE_ARGS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_INFO>(), - 88usize, - concat!("Size of: ", stringify!(_CK_INFO)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - ::std::mem::align_of::<_CK_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_INFO)) + concat!("Alignment of ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(cryptokiVersion) + stringify!(CreateMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 2usize, + unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(manufacturerID) + stringify!(DestroyMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 40usize, + unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(flags) + stringify!(LockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, - 48usize, + unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryDescription) + stringify!(UnlockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryVersion) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_C_INITIALIZE_ARGS), + "::", + stringify!(pReserved) ) ); } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], } #[test] -fn bindgen_test_layout__CK_SLOT_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SLOT_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_DATE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SLOT_INFO>(), - 112usize, - concat!("Size of: ", stringify!(_CK_SLOT_INFO)) + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_DATE)) ); assert_eq!( - ::std::mem::align_of::<_CK_SLOT_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_SLOT_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_DATE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(slotDescription) + stringify!(year) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 64usize, + unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(manufacturerID) + stringify!(month) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, + 6usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(flags) + stringify!(day) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_DERIVED_KEY() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 104usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTemplate) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(hardwareVersion) + stringify!(pTemplate) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 106usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAttributeCount) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(firmwareVersion) + stringify!(ulAttributeCount) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DERIVED_KEY), + "::", + stringify!(phKey) ) ); } -impl Default for _CK_SLOT_INFO { +impl Default for CK_DERIVED_KEY { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -888,258 +1303,323 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, } #[test] -fn bindgen_test_layout__CK_TOKEN_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_TOKEN_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_VERSION() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_TOKEN_INFO>(), - 208usize, - concat!("Size of: ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::size_of::(), + 2usize, + concat!("Size of: ", stringify!(CK_VERSION)) ); assert_eq!( - ::std::mem::align_of::<_CK_TOKEN_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_VERSION)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(label) + stringify!(major) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, + 1usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(manufacturerID) + stringify!(minor) ) ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, - 64usize, + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(model) + stringify!(cryptokiVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 2usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(serialNumber) + stringify!(manufacturerID) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, - 104usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, + 48usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulMaxSessionCount) + stringify!(libraryDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, - 112usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, + 80usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulSessionCount) + stringify!(libraryVersion) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_INTERFACE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, - 120usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulMaxRwSessionCount) - ) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, - 128usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulRwSessionCount) - ) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, - 136usize, + unsafe { ::std::ptr::addr_of!((*ptr).pInterfaceName) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMaxPinLen) + stringify!(pInterfaceName) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, - 144usize, + unsafe { ::std::ptr::addr_of!((*ptr).pFunctionList) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMinPinLen) + stringify!(pFunctionList) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, - 152usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulTotalPublicMemory) + stringify!(flags) ) ); +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, - 160usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePublicMemory) + stringify!(mechanism) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, - 168usize, + unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulTotalPrivateMemory) + stringify!(pParameter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, - 176usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePrivateMemory) + stringify!(ulParameterLen) ) ); +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM_INFO)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 184usize, + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(hardwareVersion) + stringify!(ulMinKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 186usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(firmwareVersion) + stringify!(ulMaxKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, - 188usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(utcTime) + stringify!(flags) ) ); } -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { +pub struct CK_SESSION_INFO { pub slotID: CK_SLOT_ID, pub state: CK_STATE, pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, + pub ulDeviceError: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_SESSION_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SESSION_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SESSION_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SESSION_INFO>(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(_CK_SESSION_INFO)) + concat!("Size of: ", stringify!(CK_SESSION_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_SESSION_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_SESSION_INFO)) + concat!("Alignment of ", stringify!(CK_SESSION_INFO)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).slotID) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(slotID) ) @@ -1149,7 +1629,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(state) ) @@ -1159,7 +1639,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(flags) ) @@ -1169,71 +1649,87 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(ulDeviceError) ) ); } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, } #[test] -fn bindgen_test_layout__CK_ATTRIBUTE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_ATTRIBUTE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SLOT_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_ATTRIBUTE>(), - 24usize, - concat!("Size of: ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_ATTRIBUTE>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_ATTRIBUTE)) + concat!("Alignment of ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(type_) + stringify!(slotDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(pValue) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(ulValueLen) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(hardwareVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 106usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(firmwareVersion) ) ); } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SLOT_INFO { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1244,464 +1740,499 @@ impl Default for _CK_ATTRIBUTE { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], } #[test] -fn bindgen_test_layout__CK_DATE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_DATE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_TOKEN_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_DATE>(), - 8usize, - concat!("Size of: ", stringify!(_CK_DATE)) + ::std::mem::size_of::(), + 208usize, + concat!("Size of: ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_DATE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_DATE)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(year) + stringify!(label) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(month) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, - 6usize, + unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(day) + stringify!(model) ) ); -} -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM)) + unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(serialNumber) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(mechanism) + stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParameter) + stringify!(ulMaxSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulParameterLen) + stringify!(ulSessionCount) ) ); -} -impl Default for _CK_MECHANISM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM_INFO> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM_INFO>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM_INFO)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM_INFO)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, + 120usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMinKeySize) + stringify!(ulMaxRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, + 128usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMaxKeySize) + stringify!(ulRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, + 136usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(flags) + stringify!(ulMaxPinLen) ) ); -} -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAM() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(CK_OTP_PARAM)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAM)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, + 144usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(type_) + stringify!(ulMinPinLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, + 152usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pValue) + stringify!(ulTotalPublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, + 160usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulValueLen) + stringify!(ulFreePublicMemory) ) ); -} -impl Default for CK_OTP_PARAM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAMS() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_PARAMS)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, + 168usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(ulTotalPrivateMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, + 176usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(ulFreePrivateMemory) ) ); -} -impl Default for CK_OTP_PARAMS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) - ); assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(hardwareVersion) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 186usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(firmwareVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, + 188usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(utcTime) ) ); } -impl Default for CK_OTP_SIGNATURE_INFO { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_pss_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_AES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_pss_params)) + concat!("Alignment of ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(hashAlg) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(mgf) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(sLen) + stringify!(length) ) ); } -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_oaep_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_oaep_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_oaep_params)) + concat!("Alignment of ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(hashAlg) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(source) + stringify!(ulNonceLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(pSourceData) + stringify!(pAAD) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, 32usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(ulSourceDataLen) + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_AES_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_rsa_pkcs_oaep_params { +impl Default for CK_AES_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1712,30 +2243,30 @@ impl Default for ck_rsa_pkcs_oaep_params { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], } #[test] -fn bindgen_test_layout_ck_aes_ctr_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 24usize, - concat!("Size of: ", stringify!(ck_aes_ctr_params)) + concat!("Size of: ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_ctr_params)) + concat!("Alignment of ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(ulCounterBits) ) @@ -1745,7 +2276,7 @@ fn bindgen_test_layout_ck_aes_ctr_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(cb) ) @@ -1753,34 +2284,34 @@ fn bindgen_test_layout_ck_aes_ctr_params() { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_gcm_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 48usize, - concat!("Size of: ", stringify!(ck_gcm_params)) + concat!("Size of: ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_gcm_params)) + concat!("Alignment of ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pIv) ) @@ -1790,7 +2321,7 @@ fn bindgen_test_layout_ck_gcm_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvLen) ) @@ -1800,7 +2331,7 @@ fn bindgen_test_layout_ck_gcm_params() { 16usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvBits) ) @@ -1810,7 +2341,7 @@ fn bindgen_test_layout_ck_gcm_params() { 24usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pAAD) ) @@ -1820,7 +2351,7 @@ fn bindgen_test_layout_ck_gcm_params() { 32usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulAADLen) ) @@ -1830,13 +2361,13 @@ fn bindgen_test_layout_ck_gcm_params() { 40usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulTagBits) ) ); } -impl Default for ck_gcm_params { +impl Default for CK_AES_GCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1845,83 +2376,125 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_ecdh1_derive_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_ARIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_ecdh1_derive_params)) + concat!("Alignment of ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(kdf) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulSharedDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pSharedData) + stringify!(length) ) ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, - 24usize, +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulPublicDataLen) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pPublicData) + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) ) ); } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1931,48 +2504,145 @@ impl Default for ck_ecdh1_derive_params { } } #[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(ulCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cb) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(cb) + ) + ); +} +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_key_derivation_string_data() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_CCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(ck_key_derivation_string_data)) + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_key_derivation_string_data)) + concat!("Alignment of ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(pData) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(ulLen) + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceFixedBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).nonceGenerator) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(nonceGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMAC) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pMAC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_key_derivation_string_data { +impl Default for CK_CCM_MESSAGE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1983,58 +2653,90 @@ impl Default for ck_key_derivation_string_data { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_des_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_des_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(iv) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(length) + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2045,58 +2747,68 @@ impl Default for ck_des_cbc_encrypt_data_params { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_aes_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CHACHA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Size of: ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(iv) + stringify!(pBlockCounter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).blockCounterBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CHACHA20_PARAMS), + "::", + stringify!(blockCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(length) + stringify!(ulNonceBits) ) ); } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_CHACHA20_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2105,478 +2817,7027 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_Initialize = - ::std::option::Option CK_RV>; -pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; -pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, ->; -pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismList = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismInfo = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, - ) -> CK_RV, ->; -pub type CK_C_InitToken = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, - ) -> CK_RV, ->; -pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_OpenSession = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; -pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; -pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, ->; -pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_Login = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_Logout = - ::std::option::Option CK_RV>; -pub type CK_C_CreateObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CopyObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, ->; -pub type CK_C_GetObjectSize = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjects = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; -pub type CK_C_EncryptInit = ::std::option::Option< +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CMS_SIG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).certificateHandle) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(certificateHandle) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSigningMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pSigningMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDigestMechanism) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pDigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContentType) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pContentType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequestedAttributes) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequestedAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequestedAttributesLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequestedAttributesLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequiredAttributes) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequiredAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequiredAttributesLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequiredAttributesLen) + ) + ); +} +impl Default for CK_CMS_SIG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DSA_PARAMETER_GEN_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(hash) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIndex) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulIndex) + ) + ); +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pSharedData) + ) + ); +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_ECMQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_EDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phFlag) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(phFlag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(ulContextDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(pContextData) + ) + ); +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvFixedBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ivGenerator) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ivGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pTag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pWrapOID) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pWrapOID) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWrapOIDLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulWrapOIDLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(hKey) + ) + ); +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_HKDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExtract) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExtract) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExpand) as usize - ptr as usize }, + 1usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExpand) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltType) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hSaltKey) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(hSaltKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulInfoLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulInfoLen) + ) + ); +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_KEA_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).isSender) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(isSender) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomA) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomB) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomB) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_DERIVATION_STRING_DATA() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(ulLen) + ) + ); +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_WRAP_SET_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bBC) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(bBC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(pX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulXLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(ulXLen) + ) + ); +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KIP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PBE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitVector) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pInitVector) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIteration) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulIteration) + ) + ); +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS2() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PRF_DATA_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[test] +fn bindgen_test_layout_CK_RC2_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(iv) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC2_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulRounds) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +#[test] +fn bindgen_test_layout_CK_RSA_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOAEPParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pOAEPParams) + ) + ); +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(source) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(pSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(ulSourceDataLen) + ) + ); +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_PSS_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(sLen) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!( + "Size of: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pTag) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pBlockCounter) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(ulNonceBits) + ) + ); +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SEED_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_PRIVATE_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPAndGLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPAndGLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulQLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulQLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrimeP) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPrimeP) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBaseG) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pBaseG) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSubprimeQ) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pSubprimeQ) + ) + ); +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_RELAYX_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldWrappedXLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldWrappedXLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldWrappedX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldWrappedX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPassword) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPassword) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPublicDataLen) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPublicData) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewRandomLen) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewRandomA) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewRandomA) + ) + ); +} +impl Default for CK_SKIPJACK_RELAYX_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_COUNTER_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_DKM_LENGTH_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).dkmLengthMethod) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(dkmLengthMethod) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_FEEDBACK_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulIVLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pIV) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_INITIALIZE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).initiator_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(initiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_INITIATE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_prekey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_signature) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPrekey_signature) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_key) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOnetime_key) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_identity) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_ephemeral) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_ephemeral) + ) + ); +} +impl Default for CK_X3DH_INITIATE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIdentity_id) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pIdentity_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_id) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pPrekey_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_id) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pOnetime_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_identity) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_ephemeral) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_ephemeral) + ) + ); +} +impl Default for CK_X3DH_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_MQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).OtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(OtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, +} +#[test] +fn bindgen_test_layout_CK_XEDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_XEDDSA_PARAMS), + "::", + stringify!(hash) + ) + ); +} +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerMacSecret) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerKey) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVClient) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVClient) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVServer) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVServer) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SSL3_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_SSL3_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(prfMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulLabelLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pContextData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLength) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulContextDataLength) + ) + ); +} +impl Default for CK_TLS_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_MAC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerOrClient) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulServerOrClient) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_TLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(pIV) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSequenceNumber) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulSequenceNumber) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_WTLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +pub type CK_C_Initialize = + ::std::option::Option CK_RV>; +pub type CK_C_Finalize = + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; +pub type CK_C_GetSlotList = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; +pub type CK_C_GetTokenInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, +>; +pub type CK_C_GetMechanismList = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetMechanismInfo = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, + ) -> CK_RV, +>; +pub type CK_C_InitToken = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + ) -> CK_RV, +>; +pub type CK_C_InitPIN = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetPIN = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_OpenSession = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CloseSession = + ::std::option::Option CK_RV>; +pub type CK_C_CloseAllSessions = + ::std::option::Option CK_RV>; +pub type CK_C_GetSessionInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, +>; +pub type CK_C_GetOperationState = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetOperationState = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_Login = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_Logout = + ::std::option::Option CK_RV>; +pub type CK_C_CreateObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CopyObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DestroyObject = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, +>; +pub type CK_C_GetObjectSize = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsInit = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_FindObjects = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsFinal = + ::std::option::Option CK_RV>; +pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Sign = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SignFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SignRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Verify = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_VerifyRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptDigestUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_UnwrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DeriveKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; +pub type CK_C_LoginUser = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, +} +#[test] +fn bindgen_test_layout_CK_FUNCTION_LIST_3_0() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 744usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(version) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Initialize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Finalize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetTokenInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitToken) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_OpenSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, + 112usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseAllSessions) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, + 128usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSessionInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, + 144usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, + 152usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Login) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, + 160usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Logout) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, + 168usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CreateObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, + 176usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CopyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DestroyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, + 192usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetObjectSize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, + 200usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, + 208usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, + 216usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, + 224usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjects) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, + 232usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, + 240usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, + 248usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Encrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, + 256usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, + 264usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, + 272usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, + 280usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Decrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, + 288usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, + 296usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, + 304usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, + 312usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Digest) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, + 320usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, + 328usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, + 336usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, + 344usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, + 352usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Sign) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, + 360usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, + 368usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, + 376usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, + 384usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, + 392usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, + 400usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Verify) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, + 408usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, + 416usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, + 424usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, + 432usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, + 440usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, + 448usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptDigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, + 456usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, + 464usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptVerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, + 472usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, + 480usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKeyPair) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, + 488usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, + 496usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_UnwrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, + 504usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DeriveKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, + 512usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SeedRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, + 520usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, + 528usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionStatus) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, + 536usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CancelFunction) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, + 544usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WaitForSlotEvent) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterfaceList) as usize - ptr as usize }, + 552usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterfaceList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterface) as usize - ptr as usize }, + 560usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterface) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_LoginUser) as usize - ptr as usize }, + 568usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_LoginUser) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SessionCancel) as usize - ptr as usize }, + 576usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SessionCancel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptInit) as usize - ptr as usize }, + 584usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessage) as usize - ptr as usize }, + 592usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageBegin) as usize - ptr as usize }, + 600usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageNext) as usize - ptr as usize }, + 608usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptFinal) as usize - ptr as usize }, + 616usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptInit) as usize - ptr as usize }, + 624usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessage) as usize - ptr as usize }, + 632usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageBegin) as usize - ptr as usize }, + 640usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageNext) as usize - ptr as usize }, + 648usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptFinal) as usize - ptr as usize }, + 656usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignInit) as usize - ptr as usize }, + 664usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessage) as usize - ptr as usize }, + 672usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageBegin) as usize - ptr as usize }, + 680usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageNext) as usize - ptr as usize }, + 688usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignFinal) as usize - ptr as usize }, + 696usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyInit) as usize - ptr as usize }, + 704usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessage) as usize - ptr as usize }, + 712usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageBegin) as usize - ptr as usize }, + 720usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageNext) as usize - ptr as usize }, + 728usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyFinal) as usize - ptr as usize }, + 736usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyFinal) + ) + ); +} #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -2647,25 +9908,25 @@ pub struct _CK_FUNCTION_LIST { pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } #[test] -fn bindgen_test_layout__CK_FUNCTION_LIST() { - const UNINIT: ::std::mem::MaybeUninit<_CK_FUNCTION_LIST> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_FUNCTION_LIST() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_FUNCTION_LIST>(), + ::std::mem::size_of::(), 552usize, - concat!("Size of: ", stringify!(_CK_FUNCTION_LIST)) + concat!("Size of: ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( - ::std::mem::align_of::<_CK_FUNCTION_LIST>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_FUNCTION_LIST)) + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(version) ) @@ -2675,7 +9936,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Initialize) ) @@ -2685,7 +9946,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Finalize) ) @@ -2695,7 +9956,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetInfo) ) @@ -2705,7 +9966,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 32usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionList) ) @@ -2715,7 +9976,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 40usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotList) ) @@ -2725,7 +9986,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 48usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotInfo) ) @@ -2735,7 +9996,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 56usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetTokenInfo) ) @@ -2745,7 +10006,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 64usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismList) ) @@ -2755,7 +10016,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 72usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismInfo) ) @@ -2765,7 +10026,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 80usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitToken) ) @@ -2775,7 +10036,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 88usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitPIN) ) @@ -2785,7 +10046,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 96usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetPIN) ) @@ -2795,7 +10056,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 104usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_OpenSession) ) @@ -2805,7 +10066,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 112usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseSession) ) @@ -2815,7 +10076,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 120usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseAllSessions) ) @@ -2825,7 +10086,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 128usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSessionInfo) ) @@ -2835,7 +10096,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 136usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetOperationState) ) @@ -2845,7 +10106,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 144usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetOperationState) ) @@ -2855,7 +10116,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 152usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Login) ) @@ -2865,7 +10126,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 160usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Logout) ) @@ -2875,7 +10136,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 168usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CreateObject) ) @@ -2885,7 +10146,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 176usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CopyObject) ) @@ -2895,7 +10156,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 184usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DestroyObject) ) @@ -2905,7 +10166,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 192usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetObjectSize) ) @@ -2915,7 +10176,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 200usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetAttributeValue) ) @@ -2925,7 +10186,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 208usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetAttributeValue) ) @@ -2935,7 +10196,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 216usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsInit) ) @@ -2945,7 +10206,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 224usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjects) ) @@ -2955,7 +10216,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 232usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsFinal) ) @@ -2965,7 +10226,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 240usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptInit) ) @@ -2975,7 +10236,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 248usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Encrypt) ) @@ -2985,7 +10246,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 256usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptUpdate) ) @@ -2995,7 +10256,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 264usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptFinal) ) @@ -3005,7 +10266,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 272usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptInit) ) @@ -3015,7 +10276,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 280usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Decrypt) ) @@ -3025,7 +10286,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 288usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptUpdate) ) @@ -3035,7 +10296,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 296usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptFinal) ) @@ -3045,7 +10306,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 304usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestInit) ) @@ -3055,7 +10316,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 312usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Digest) ) @@ -3065,7 +10326,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 320usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestUpdate) ) @@ -3075,7 +10336,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 328usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestKey) ) @@ -3085,7 +10346,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 336usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestFinal) ) @@ -3095,7 +10356,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 344usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignInit) ) @@ -3105,7 +10366,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 352usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Sign) ) @@ -3115,7 +10376,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 360usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignUpdate) ) @@ -3125,7 +10386,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 368usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignFinal) ) @@ -3135,7 +10396,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 376usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecoverInit) ) @@ -3145,7 +10406,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 384usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecover) ) @@ -3155,7 +10416,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 392usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyInit) ) @@ -3165,7 +10426,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 400usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Verify) ) @@ -3175,7 +10436,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 408usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyUpdate) ) @@ -3185,7 +10446,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 416usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyFinal) ) @@ -3195,7 +10456,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 424usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecoverInit) ) @@ -3205,7 +10466,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 432usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecover) ) @@ -3215,7 +10476,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 440usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestEncryptUpdate) ) @@ -3225,7 +10486,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 448usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptDigestUpdate) ) @@ -3235,7 +10496,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 456usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignEncryptUpdate) ) @@ -3245,7 +10506,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 464usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptVerifyUpdate) ) @@ -3255,7 +10516,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 472usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKey) ) @@ -3265,7 +10526,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 480usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKeyPair) ) @@ -3275,7 +10536,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 488usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WrapKey) ) @@ -3285,7 +10546,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 496usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_UnwrapKey) ) @@ -3295,7 +10556,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 504usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DeriveKey) ) @@ -3305,7 +10566,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 512usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SeedRandom) ) @@ -3315,7 +10576,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 520usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateRandom) ) @@ -3325,7 +10586,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 528usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionStatus) ) @@ -3335,7 +10596,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 536usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CancelFunction) ) @@ -3345,704 +10606,716 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 544usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WaitForSlotEvent) ) ); } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -#[test] -fn bindgen_test_layout__CK_C_INITIALIZE_ARGS() { - const UNINIT: ::std::mem::MaybeUninit<_CK_C_INITIALIZE_ARGS> = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_C_INITIALIZE_ARGS>(), - 48usize, - concat!("Size of: ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_C_INITIALIZE_ARGS>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(CreateMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, - 8usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(DestroyMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, - 16usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(LockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, - 24usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(UnlockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 32usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(flags) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, - 40usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(pReserved) - ) - ); -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], -} -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, + ::libloading::Error, + >, + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -4064,7 +11337,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -4125,6 +11397,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -4134,7 +11431,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -4195,872 +11491,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/bindings/x86_64-unknown-linux-gnu.rs b/cryptoki-sys/src/bindings/x86_64-unknown-linux-gnu.rs index 81bdfa3d..ecfed114 100644 --- a/cryptoki-sys/src/bindings/x86_64-unknown-linux-gnu.rs +++ b/cryptoki-sys/src/bindings/x86_64-unknown-linux-gnu.rs @@ -1,103 +1,47 @@ /* automatically generated by rust-bindgen 0.69.4 */ -pub const PKCS11_H: u32 = 1; -pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 2; -pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 40; -pub const P11_KIT_CRYPTOKI_VERSION_REVISION: u32 = 0; -pub const CRYPTOKI_COMPAT: u32 = 1; -pub const CKF_RNG: CK_FLAGS = 1; -pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; -pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; -pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; -pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; -pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; -pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; -pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; -pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; -pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; -pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; -pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; -pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; -pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; -pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; -pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; -pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; -pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; -pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CRYPTOKI_VERSION_MAJOR: CK_BYTE = 3; +pub const CRYPTOKI_VERSION_MINOR: CK_BYTE = 0; +pub const CRYPTOKI_VERSION_AMENDMENT: CK_BYTE = 0; pub const CK_EFFECTIVELY_INFINITE: CK_ULONG = 0; pub const CK_INVALID_HANDLE: CK_ULONG = 0; -pub const CKU_SO: CK_USER_TYPE = 0; -pub const CKU_USER: CK_USER_TYPE = 1; -pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; -pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; -pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; -pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; -pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; -pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; -pub const CKF_RW_SESSION: CK_FLAGS = 2; -pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; -pub const CKO_DATA: CK_OBJECT_CLASS = 0; -pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; -pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; -pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; -pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; -pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; -pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; -pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; -pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; -pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; -pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; -pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; -pub const CKK_RSA: CK_KEY_TYPE = 0; -pub const CKK_DSA: CK_KEY_TYPE = 1; -pub const CKK_DH: CK_KEY_TYPE = 2; -pub const CKK_ECDSA: CK_KEY_TYPE = 3; -pub const CKK_EC: CK_KEY_TYPE = 3; -pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; -pub const CKK_KEA: CK_KEY_TYPE = 5; -pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; -pub const CKK_RC2: CK_KEY_TYPE = 17; -pub const CKK_RC4: CK_KEY_TYPE = 18; -pub const CKK_DES: CK_KEY_TYPE = 19; -pub const CKK_DES2: CK_KEY_TYPE = 20; -pub const CKK_DES3: CK_KEY_TYPE = 21; -pub const CKK_CAST: CK_KEY_TYPE = 22; -pub const CKK_CAST3: CK_KEY_TYPE = 23; -pub const CKK_CAST128: CK_KEY_TYPE = 24; -pub const CKK_RC5: CK_KEY_TYPE = 25; -pub const CKK_IDEA: CK_KEY_TYPE = 26; -pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; -pub const CKK_BATON: CK_KEY_TYPE = 28; -pub const CKK_JUNIPER: CK_KEY_TYPE = 29; -pub const CKK_CDMF: CK_KEY_TYPE = 30; -pub const CKK_AES: CK_KEY_TYPE = 31; -pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; -pub const CKK_TWOFISH: CK_KEY_TYPE = 33; -pub const CKK_SECURID: CK_KEY_TYPE = 34; -pub const CKK_HOTP: CK_KEY_TYPE = 35; -pub const CKK_ACTI: CK_KEY_TYPE = 36; -pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; -pub const CKK_ARIA: CK_KEY_TYPE = 38; -pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; -pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; -pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; -pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; -pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; -pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; -pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; -pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; -pub const CKK_SEED: CK_KEY_TYPE = 47; -pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; -pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; -pub const CKK_GOST28147: CK_KEY_TYPE = 50; -pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; -pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; -pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; -pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CK_TRUE: CK_BBOOL = 1; +pub const CK_FALSE: CK_BBOOL = 0; +pub const CK_CERTIFICATE_CATEGORY_UNSPECIFIED: CK_ULONG = 0; +pub const CK_CERTIFICATE_CATEGORY_TOKEN_USER: CK_ULONG = 1; +pub const CK_CERTIFICATE_CATEGORY_AUTHORITY: CK_ULONG = 2; +pub const CK_CERTIFICATE_CATEGORY_OTHER_ENTITY: CK_ULONG = 3; +pub const CK_OTP_VALUE: CK_ULONG = 0; +pub const CK_OTP_PIN: CK_ULONG = 1; +pub const CK_OTP_CHALLENGE: CK_ULONG = 2; +pub const CK_OTP_TIME: CK_ULONG = 3; +pub const CK_OTP_COUNTER: CK_ULONG = 4; +pub const CK_OTP_FLAGS: CK_ULONG = 5; +pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; +pub const CK_OTP_OUTPUT_FORMAT: CK_ULONG = 7; +pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; +pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; +pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; +pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; +pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; +pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; +pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_UNSPECIFIED: CK_ULONG = 0; +pub const CK_SECURITY_DOMAIN_MANUFACTURER: CK_ULONG = 1; +pub const CK_SECURITY_DOMAIN_OPERATOR: CK_ULONG = 2; +pub const CK_SECURITY_DOMAIN_THIRD_PARTY: CK_ULONG = 3; +pub const CK_SP800_108_ITERATION_VARIABLE: CK_ULONG = 1; +pub const CK_SP800_108_OPTIONAL_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_COUNTER: CK_ULONG = 2; +pub const CK_SP800_108_DKM_LENGTH: CK_ULONG = 3; +pub const CK_SP800_108_BYTE_ARRAY: CK_ULONG = 4; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS: CK_ULONG = 1; +pub const CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS: CK_ULONG = 2; pub const CKA_CLASS: CK_ATTRIBUTE_TYPE = 0; pub const CKA_TOKEN: CK_ATTRIBUTE_TYPE = 1; pub const CKA_PRIVATE: CK_ATTRIBUTE_TYPE = 2; pub const CKA_LABEL: CK_ATTRIBUTE_TYPE = 3; +pub const CKA_UNIQUE_ID: CK_ATTRIBUTE_TYPE = 4; pub const CKA_APPLICATION: CK_ATTRIBUTE_TYPE = 16; pub const CKA_VALUE: CK_ATTRIBUTE_TYPE = 17; pub const CKA_OBJECT_ID: CK_ATTRIBUTE_TYPE = 18; @@ -144,6 +88,7 @@ pub const CKA_PRIME: CK_ATTRIBUTE_TYPE = 304; pub const CKA_SUBPRIME: CK_ATTRIBUTE_TYPE = 305; pub const CKA_BASE: CK_ATTRIBUTE_TYPE = 306; pub const CKA_PRIME_BITS: CK_ATTRIBUTE_TYPE = 307; +pub const CKA_SUBPRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_SUB_PRIME_BITS: CK_ATTRIBUTE_TYPE = 308; pub const CKA_VALUE_BITS: CK_ATTRIBUTE_TYPE = 352; pub const CKA_VALUE_LEN: CK_ATTRIBUTE_TYPE = 353; @@ -155,11 +100,8 @@ pub const CKA_KEY_GEN_MECHANISM: CK_ATTRIBUTE_TYPE = 358; pub const CKA_MODIFIABLE: CK_ATTRIBUTE_TYPE = 368; pub const CKA_COPYABLE: CK_ATTRIBUTE_TYPE = 369; pub const CKA_DESTROYABLE: CK_ATTRIBUTE_TYPE = 370; -pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_PARAMS: CK_ATTRIBUTE_TYPE = 384; pub const CKA_EC_POINT: CK_ATTRIBUTE_TYPE = 385; -pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; -pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; pub const CKA_ALWAYS_AUTHENTICATE: CK_ATTRIBUTE_TYPE = 514; pub const CKA_WRAP_WITH_TRUSTED: CK_ATTRIBUTE_TYPE = 528; pub const CKA_OTP_FORMAT: CK_ATTRIBUTE_TYPE = 544; @@ -170,12 +112,12 @@ pub const CKA_OTP_CHALLENGE_REQUIREMENT: CK_ATTRIBUTE_TYPE = 548; pub const CKA_OTP_TIME_REQUIREMENT: CK_ATTRIBUTE_TYPE = 549; pub const CKA_OTP_COUNTER_REQUIREMENT: CK_ATTRIBUTE_TYPE = 550; pub const CKA_OTP_PIN_REQUIREMENT: CK_ATTRIBUTE_TYPE = 551; +pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; +pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_OTP_USER_IDENTIFIER: CK_ATTRIBUTE_TYPE = 554; pub const CKA_OTP_SERVICE_IDENTIFIER: CK_ATTRIBUTE_TYPE = 555; pub const CKA_OTP_SERVICE_LOGO: CK_ATTRIBUTE_TYPE = 556; pub const CKA_OTP_SERVICE_LOGO_TYPE: CK_ATTRIBUTE_TYPE = 557; -pub const CKA_OTP_COUNTER: CK_ATTRIBUTE_TYPE = 558; -pub const CKA_OTP_TIME: CK_ATTRIBUTE_TYPE = 559; pub const CKA_GOSTR3410_PARAMS: CK_ATTRIBUTE_TYPE = 592; pub const CKA_GOSTR3411_PARAMS: CK_ATTRIBUTE_TYPE = 593; pub const CKA_GOST28147_PARAMS: CK_ATTRIBUTE_TYPE = 594; @@ -196,6 +138,210 @@ pub const CKA_MECHANISM_TYPE: CK_ATTRIBUTE_TYPE = 1280; pub const CKA_REQUIRED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1281; pub const CKA_DEFAULT_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1282; pub const CKA_SUPPORTED_CMS_ATTRIBUTES: CK_ATTRIBUTE_TYPE = 1283; +pub const CKA_PROFILE_ID: CK_ATTRIBUTE_TYPE = 1537; +pub const CKA_X2RATCHET_BAG: CK_ATTRIBUTE_TYPE = 1538; +pub const CKA_X2RATCHET_BAGSIZE: CK_ATTRIBUTE_TYPE = 1539; +pub const CKA_X2RATCHET_BOBS1STMSG: CK_ATTRIBUTE_TYPE = 1540; +pub const CKA_X2RATCHET_CKR: CK_ATTRIBUTE_TYPE = 1541; +pub const CKA_X2RATCHET_CKS: CK_ATTRIBUTE_TYPE = 1542; +pub const CKA_X2RATCHET_DHP: CK_ATTRIBUTE_TYPE = 1543; +pub const CKA_X2RATCHET_DHR: CK_ATTRIBUTE_TYPE = 1544; +pub const CKA_X2RATCHET_DHS: CK_ATTRIBUTE_TYPE = 1545; +pub const CKA_X2RATCHET_HKR: CK_ATTRIBUTE_TYPE = 1546; +pub const CKA_X2RATCHET_HKS: CK_ATTRIBUTE_TYPE = 1547; +pub const CKA_X2RATCHET_ISALICE: CK_ATTRIBUTE_TYPE = 1548; +pub const CKA_X2RATCHET_NHKR: CK_ATTRIBUTE_TYPE = 1549; +pub const CKA_X2RATCHET_NHKS: CK_ATTRIBUTE_TYPE = 1550; +pub const CKA_X2RATCHET_NR: CK_ATTRIBUTE_TYPE = 1551; +pub const CKA_X2RATCHET_NS: CK_ATTRIBUTE_TYPE = 1552; +pub const CKA_X2RATCHET_PNS: CK_ATTRIBUTE_TYPE = 1553; +pub const CKA_X2RATCHET_RK: CK_ATTRIBUTE_TYPE = 1554; +pub const CKA_VENDOR_DEFINED: CK_ATTRIBUTE_TYPE = 2147483648; +pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742353; +pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742354; +pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = 1073742355; +pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = 1073743360; +pub const CKA_ECDSA_PARAMS: CK_ATTRIBUTE_TYPE = 384; +pub const CKA_SECONDARY_AUTH: CK_ATTRIBUTE_TYPE = 512; +pub const CKA_AUTH_PIN_FLAGS: CK_ATTRIBUTE_TYPE = 513; +pub const CKC_X_509: CK_CERTIFICATE_TYPE = 0; +pub const CKC_X_509_ATTR_CERT: CK_CERTIFICATE_TYPE = 1; +pub const CKC_WTLS: CK_CERTIFICATE_TYPE = 2; +pub const CKC_VENDOR_DEFINED: CK_CERTIFICATE_TYPE = 2147483648; +pub const CKD_NULL: CK_EC_KDF_TYPE = 1; +pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; +pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; +pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; +pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; +pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; +pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; +pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; +pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; +pub const CKD_SHA3_224_KDF: CK_EC_KDF_TYPE = 10; +pub const CKD_SHA3_256_KDF: CK_EC_KDF_TYPE = 11; +pub const CKD_SHA3_384_KDF: CK_EC_KDF_TYPE = 12; +pub const CKD_SHA3_512_KDF: CK_EC_KDF_TYPE = 13; +pub const CKD_SHA1_KDF_SP800: CK_EC_KDF_TYPE = 14; +pub const CKD_SHA224_KDF_SP800: CK_EC_KDF_TYPE = 15; +pub const CKD_SHA256_KDF_SP800: CK_EC_KDF_TYPE = 16; +pub const CKD_SHA384_KDF_SP800: CK_EC_KDF_TYPE = 17; +pub const CKD_SHA512_KDF_SP800: CK_EC_KDF_TYPE = 18; +pub const CKD_SHA3_224_KDF_SP800: CK_EC_KDF_TYPE = 19; +pub const CKD_SHA3_256_KDF_SP800: CK_EC_KDF_TYPE = 20; +pub const CKD_SHA3_384_KDF_SP800: CK_EC_KDF_TYPE = 21; +pub const CKD_SHA3_512_KDF_SP800: CK_EC_KDF_TYPE = 22; +pub const CKD_BLAKE2B_160_KDF: CK_EC_KDF_TYPE = 23; +pub const CKD_BLAKE2B_256_KDF: CK_EC_KDF_TYPE = 24; +pub const CKD_BLAKE2B_384_KDF: CK_EC_KDF_TYPE = 25; +pub const CKD_BLAKE2B_512_KDF: CK_EC_KDF_TYPE = 26; +pub const CKF_ARRAY_ATTRIBUTE: CK_FLAGS = 1073741824; +pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; +pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_NULL: CK_FLAGS = 1; +pub const CKF_HKDF_SALT_DATA: CK_FLAGS = 2; +pub const CKF_HKDF_SALT_KEY: CK_FLAGS = 4; +pub const CKF_INTERFACE_FORK_SAFE: CK_FLAGS = 1; +pub const CKF_HW: CK_FLAGS = 1; +pub const CKF_MESSAGE_ENCRYPT: CK_FLAGS = 2; +pub const CKF_MESSAGE_DECRYPT: CK_FLAGS = 4; +pub const CKF_MESSAGE_SIGN: CK_FLAGS = 8; +pub const CKF_MESSAGE_VERIFY: CK_FLAGS = 16; +pub const CKF_MULTI_MESSAGE: CK_FLAGS = 32; +pub const CKF_MULTI_MESSGE: CK_FLAGS = 32; +pub const CKF_FIND_OBJECTS: CK_FLAGS = 64; +pub const CKF_ENCRYPT: CK_FLAGS = 256; +pub const CKF_DECRYPT: CK_FLAGS = 512; +pub const CKF_DIGEST: CK_FLAGS = 1024; +pub const CKF_SIGN: CK_FLAGS = 2048; +pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; +pub const CKF_VERIFY: CK_FLAGS = 8192; +pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; +pub const CKF_GENERATE: CK_FLAGS = 32768; +pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; +pub const CKF_WRAP: CK_FLAGS = 131072; +pub const CKF_UNWRAP: CK_FLAGS = 262144; +pub const CKF_DERIVE: CK_FLAGS = 524288; +pub const CKF_EC_F_P: CK_FLAGS = 1048576; +pub const CKF_EC_F_2M: CK_FLAGS = 2097152; +pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; +pub const CKF_EC_OID: CK_FLAGS = 8388608; +pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; +pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; +pub const CKF_EC_CURVENAME: CK_FLAGS = 67108864; +pub const CKF_EXTENSION: CK_FLAGS = 2147483648; +pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; +pub const CKF_END_OF_MESSAGE: CK_FLAGS = 1; +pub const CKF_NEXT_OTP: CK_FLAGS = 1; +pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; +pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; +pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; +pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; +pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKF_DONT_BLOCK: CK_FLAGS = 1; +pub const CKF_RW_SESSION: CK_FLAGS = 2; +pub const CKF_SERIAL_SESSION: CK_FLAGS = 4; +pub const CKF_TOKEN_PRESENT: CK_FLAGS = 1; +pub const CKF_REMOVABLE_DEVICE: CK_FLAGS = 2; +pub const CKF_HW_SLOT: CK_FLAGS = 4; +pub const CKF_RNG: CK_FLAGS = 1; +pub const CKF_WRITE_PROTECTED: CK_FLAGS = 2; +pub const CKF_LOGIN_REQUIRED: CK_FLAGS = 4; +pub const CKF_USER_PIN_INITIALIZED: CK_FLAGS = 8; +pub const CKF_RESTORE_KEY_NOT_NEEDED: CK_FLAGS = 32; +pub const CKF_CLOCK_ON_TOKEN: CK_FLAGS = 64; +pub const CKF_PROTECTED_AUTHENTICATION_PATH: CK_FLAGS = 256; +pub const CKF_DUAL_CRYPTO_OPERATIONS: CK_FLAGS = 512; +pub const CKF_TOKEN_INITIALIZED: CK_FLAGS = 1024; +pub const CKF_SECONDARY_AUTHENTICATION: CK_FLAGS = 2048; +pub const CKF_USER_PIN_COUNT_LOW: CK_FLAGS = 65536; +pub const CKF_USER_PIN_FINAL_TRY: CK_FLAGS = 131072; +pub const CKF_USER_PIN_LOCKED: CK_FLAGS = 262144; +pub const CKF_USER_PIN_TO_BE_CHANGED: CK_FLAGS = 524288; +pub const CKF_SO_PIN_COUNT_LOW: CK_FLAGS = 1048576; +pub const CKF_SO_PIN_FINAL_TRY: CK_FLAGS = 2097152; +pub const CKF_SO_PIN_LOCKED: CK_FLAGS = 4194304; +pub const CKF_SO_PIN_TO_BE_CHANGED: CK_FLAGS = 8388608; +pub const CKF_ERROR_STATE: CK_FLAGS = 16777216; +pub const CKG_NO_GENERATE: CK_GENERATOR_FUNCTION = 0; +pub const CKG_GENERATE: CK_GENERATOR_FUNCTION = 1; +pub const CKG_GENERATE_COUNTER: CK_GENERATOR_FUNCTION = 2; +pub const CKG_GENERATE_RANDOM: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA1: CK_GENERATOR_FUNCTION = 1; +pub const CKG_MGF1_SHA256: CK_GENERATOR_FUNCTION = 2; +pub const CKG_MGF1_SHA384: CK_GENERATOR_FUNCTION = 3; +pub const CKG_MGF1_SHA512: CK_GENERATOR_FUNCTION = 4; +pub const CKG_MGF1_SHA224: CK_GENERATOR_FUNCTION = 5; +pub const CKG_MGF1_SHA3_224: CK_GENERATOR_FUNCTION = 6; +pub const CKG_MGF1_SHA3_256: CK_GENERATOR_FUNCTION = 7; +pub const CKG_MGF1_SHA3_384: CK_GENERATOR_FUNCTION = 8; +pub const CKG_MGF1_SHA3_512: CK_GENERATOR_FUNCTION = 9; +pub const CKH_MONOTONIC_COUNTER: CK_HW_FEATURE_TYPE = 1; +pub const CKH_CLOCK: CK_HW_FEATURE_TYPE = 2; +pub const CKH_USER_INTERFACE: CK_HW_FEATURE_TYPE = 3; +pub const CKH_VENDOR_DEFINED: CK_HW_FEATURE_TYPE = 2147483648; +pub const CKK_RSA: CK_KEY_TYPE = 0; +pub const CKK_DSA: CK_KEY_TYPE = 1; +pub const CKK_DH: CK_KEY_TYPE = 2; +pub const CKK_EC: CK_KEY_TYPE = 3; +pub const CKK_X9_42_DH: CK_KEY_TYPE = 4; +pub const CKK_KEA: CK_KEY_TYPE = 5; +pub const CKK_GENERIC_SECRET: CK_KEY_TYPE = 16; +pub const CKK_RC2: CK_KEY_TYPE = 17; +pub const CKK_RC4: CK_KEY_TYPE = 18; +pub const CKK_DES: CK_KEY_TYPE = 19; +pub const CKK_DES2: CK_KEY_TYPE = 20; +pub const CKK_DES3: CK_KEY_TYPE = 21; +pub const CKK_CAST: CK_KEY_TYPE = 22; +pub const CKK_CAST3: CK_KEY_TYPE = 23; +pub const CKK_CAST128: CK_KEY_TYPE = 24; +pub const CKK_RC5: CK_KEY_TYPE = 25; +pub const CKK_IDEA: CK_KEY_TYPE = 26; +pub const CKK_SKIPJACK: CK_KEY_TYPE = 27; +pub const CKK_BATON: CK_KEY_TYPE = 28; +pub const CKK_JUNIPER: CK_KEY_TYPE = 29; +pub const CKK_CDMF: CK_KEY_TYPE = 30; +pub const CKK_AES: CK_KEY_TYPE = 31; +pub const CKK_BLOWFISH: CK_KEY_TYPE = 32; +pub const CKK_TWOFISH: CK_KEY_TYPE = 33; +pub const CKK_SECURID: CK_KEY_TYPE = 34; +pub const CKK_HOTP: CK_KEY_TYPE = 35; +pub const CKK_ACTI: CK_KEY_TYPE = 36; +pub const CKK_CAMELLIA: CK_KEY_TYPE = 37; +pub const CKK_ARIA: CK_KEY_TYPE = 38; +pub const CKK_MD5_HMAC: CK_KEY_TYPE = 39; +pub const CKK_SHA_1_HMAC: CK_KEY_TYPE = 40; +pub const CKK_RIPEMD128_HMAC: CK_KEY_TYPE = 41; +pub const CKK_RIPEMD160_HMAC: CK_KEY_TYPE = 42; +pub const CKK_SHA256_HMAC: CK_KEY_TYPE = 43; +pub const CKK_SHA384_HMAC: CK_KEY_TYPE = 44; +pub const CKK_SHA512_HMAC: CK_KEY_TYPE = 45; +pub const CKK_SHA224_HMAC: CK_KEY_TYPE = 46; +pub const CKK_SEED: CK_KEY_TYPE = 47; +pub const CKK_GOSTR3410: CK_KEY_TYPE = 48; +pub const CKK_GOSTR3411: CK_KEY_TYPE = 49; +pub const CKK_GOST28147: CK_KEY_TYPE = 50; +pub const CKK_CHACHA20: CK_KEY_TYPE = 51; +pub const CKK_POLY1305: CK_KEY_TYPE = 52; +pub const CKK_AES_XTS: CK_KEY_TYPE = 53; +pub const CKK_SHA3_224_HMAC: CK_KEY_TYPE = 54; +pub const CKK_SHA3_256_HMAC: CK_KEY_TYPE = 55; +pub const CKK_SHA3_384_HMAC: CK_KEY_TYPE = 56; +pub const CKK_SHA3_512_HMAC: CK_KEY_TYPE = 57; +pub const CKK_BLAKE2B_160_HMAC: CK_KEY_TYPE = 58; +pub const CKK_BLAKE2B_256_HMAC: CK_KEY_TYPE = 59; +pub const CKK_BLAKE2B_384_HMAC: CK_KEY_TYPE = 60; +pub const CKK_BLAKE2B_512_HMAC: CK_KEY_TYPE = 61; +pub const CKK_SALSA20: CK_KEY_TYPE = 62; +pub const CKK_X2RATCHET: CK_KEY_TYPE = 63; +pub const CKK_EC_EDWARDS: CK_KEY_TYPE = 64; +pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 65; +pub const CKK_HKDF: CK_KEY_TYPE = 66; +pub const CKK_SHA512_224_HMAC: CK_KEY_TYPE = 67; +pub const CKK_SHA512_256_HMAC: CK_KEY_TYPE = 68; +pub const CKK_SHA512_T_HMAC: CK_KEY_TYPE = 69; +pub const CKK_VENDOR_DEFINED: CK_KEY_TYPE = 2147483648; +pub const CKK_ECDSA: CK_KEY_TYPE = 3; +pub const CKK_CAST5: CK_KEY_TYPE = 24; pub const CKM_RSA_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 0; pub const CKM_RSA_PKCS: CK_MECHANISM_TYPE = 1; pub const CKM_RSA_9796: CK_MECHANISM_TYPE = 2; @@ -218,6 +364,10 @@ pub const CKM_DSA_SHA224: CK_MECHANISM_TYPE = 19; pub const CKM_DSA_SHA256: CK_MECHANISM_TYPE = 20; pub const CKM_DSA_SHA384: CK_MECHANISM_TYPE = 21; pub const CKM_DSA_SHA512: CK_MECHANISM_TYPE = 22; +pub const CKM_DSA_SHA3_224: CK_MECHANISM_TYPE = 24; +pub const CKM_DSA_SHA3_256: CK_MECHANISM_TYPE = 25; +pub const CKM_DSA_SHA3_384: CK_MECHANISM_TYPE = 26; +pub const CKM_DSA_SHA3_512: CK_MECHANISM_TYPE = 27; pub const CKM_DH_PKCS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 32; pub const CKM_DH_PKCS_DERIVE: CK_MECHANISM_TYPE = 33; pub const CKM_X9_42_DH_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 48; @@ -230,6 +380,8 @@ pub const CKM_SHA512_RSA_PKCS: CK_MECHANISM_TYPE = 66; pub const CKM_SHA256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 67; pub const CKM_SHA384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 68; pub const CKM_SHA512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 69; +pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; +pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; pub const CKM_SHA512_224: CK_MECHANISM_TYPE = 72; pub const CKM_SHA512_224_HMAC: CK_MECHANISM_TYPE = 73; pub const CKM_SHA512_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 74; @@ -242,6 +394,14 @@ pub const CKM_SHA512_T: CK_MECHANISM_TYPE = 80; pub const CKM_SHA512_T_HMAC: CK_MECHANISM_TYPE = 81; pub const CKM_SHA512_T_HMAC_GENERAL: CK_MECHANISM_TYPE = 82; pub const CKM_SHA512_T_KEY_DERIVATION: CK_MECHANISM_TYPE = 83; +pub const CKM_SHA3_256_RSA_PKCS: CK_MECHANISM_TYPE = 96; +pub const CKM_SHA3_384_RSA_PKCS: CK_MECHANISM_TYPE = 97; +pub const CKM_SHA3_512_RSA_PKCS: CK_MECHANISM_TYPE = 98; +pub const CKM_SHA3_256_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 99; +pub const CKM_SHA3_384_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 100; +pub const CKM_SHA3_512_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 101; +pub const CKM_SHA3_224_RSA_PKCS: CK_MECHANISM_TYPE = 102; +pub const CKM_SHA3_224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 103; pub const CKM_RC2_KEY_GEN: CK_MECHANISM_TYPE = 256; pub const CKM_RC2_ECB: CK_MECHANISM_TYPE = 257; pub const CKM_RC2_CBC: CK_MECHANISM_TYPE = 258; @@ -293,6 +453,9 @@ pub const CKM_RIPEMD160_HMAC_GENERAL: CK_MECHANISM_TYPE = 578; pub const CKM_SHA256: CK_MECHANISM_TYPE = 592; pub const CKM_SHA256_HMAC: CK_MECHANISM_TYPE = 593; pub const CKM_SHA256_HMAC_GENERAL: CK_MECHANISM_TYPE = 594; +pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; +pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; +pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; pub const CKM_SHA384: CK_MECHANISM_TYPE = 608; pub const CKM_SHA384_HMAC: CK_MECHANISM_TYPE = 609; pub const CKM_SHA384_HMAC_GENERAL: CK_MECHANISM_TYPE = 610; @@ -305,6 +468,22 @@ pub const CKM_HOTP_KEY_GEN: CK_MECHANISM_TYPE = 656; pub const CKM_HOTP: CK_MECHANISM_TYPE = 657; pub const CKM_ACTI: CK_MECHANISM_TYPE = 672; pub const CKM_ACTI_KEY_GEN: CK_MECHANISM_TYPE = 673; +pub const CKM_SHA3_256: CK_MECHANISM_TYPE = 688; +pub const CKM_SHA3_256_HMAC: CK_MECHANISM_TYPE = 689; +pub const CKM_SHA3_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 690; +pub const CKM_SHA3_256_KEY_GEN: CK_MECHANISM_TYPE = 691; +pub const CKM_SHA3_224: CK_MECHANISM_TYPE = 693; +pub const CKM_SHA3_224_HMAC: CK_MECHANISM_TYPE = 694; +pub const CKM_SHA3_224_HMAC_GENERAL: CK_MECHANISM_TYPE = 695; +pub const CKM_SHA3_224_KEY_GEN: CK_MECHANISM_TYPE = 696; +pub const CKM_SHA3_384: CK_MECHANISM_TYPE = 704; +pub const CKM_SHA3_384_HMAC: CK_MECHANISM_TYPE = 705; +pub const CKM_SHA3_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 706; +pub const CKM_SHA3_384_KEY_GEN: CK_MECHANISM_TYPE = 707; +pub const CKM_SHA3_512: CK_MECHANISM_TYPE = 720; +pub const CKM_SHA3_512_HMAC: CK_MECHANISM_TYPE = 721; +pub const CKM_SHA3_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 722; +pub const CKM_SHA3_512_KEY_GEN: CK_MECHANISM_TYPE = 723; pub const CKM_CAST_KEY_GEN: CK_MECHANISM_TYPE = 768; pub const CKM_CAST_ECB: CK_MECHANISM_TYPE = 769; pub const CKM_CAST_CBC: CK_MECHANISM_TYPE = 770; @@ -317,17 +496,12 @@ pub const CKM_CAST3_CBC: CK_MECHANISM_TYPE = 786; pub const CKM_CAST3_MAC: CK_MECHANISM_TYPE = 787; pub const CKM_CAST3_MAC_GENERAL: CK_MECHANISM_TYPE = 788; pub const CKM_CAST3_CBC_PAD: CK_MECHANISM_TYPE = 789; -pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST128_KEY_GEN: CK_MECHANISM_TYPE = 800; pub const CKM_CAST5_ECB: CK_MECHANISM_TYPE = 801; pub const CKM_CAST128_ECB: CK_MECHANISM_TYPE = 801; -pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; -pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; pub const CKM_CAST128_MAC: CK_MECHANISM_TYPE = 803; -pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST128_CBC: CK_MECHANISM_TYPE = 802; pub const CKM_CAST128_MAC_GENERAL: CK_MECHANISM_TYPE = 804; -pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_CAST128_CBC_PAD: CK_MECHANISM_TYPE = 805; pub const CKM_RC5_KEY_GEN: CK_MECHANISM_TYPE = 816; pub const CKM_RC5_ECB: CK_MECHANISM_TYPE = 817; @@ -364,13 +538,24 @@ pub const CKM_SHA1_KEY_DERIVATION: CK_MECHANISM_TYPE = 914; pub const CKM_SHA256_KEY_DERIVATION: CK_MECHANISM_TYPE = 915; pub const CKM_SHA384_KEY_DERIVATION: CK_MECHANISM_TYPE = 916; pub const CKM_SHA512_KEY_DERIVATION: CK_MECHANISM_TYPE = 917; +pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; +pub const CKM_SHA3_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_256_KEY_DERIVE: CK_MECHANISM_TYPE = 919; +pub const CKM_SHA3_224_KEY_DERIVATION: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_224_KEY_DERIVE: CK_MECHANISM_TYPE = 920; +pub const CKM_SHA3_384_KEY_DERIVATION: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_384_KEY_DERIVE: CK_MECHANISM_TYPE = 921; +pub const CKM_SHA3_512_KEY_DERIVATION: CK_MECHANISM_TYPE = 922; +pub const CKM_SHA3_512_KEY_DERIVE: CK_MECHANISM_TYPE = 922; +pub const CKM_SHAKE_128_KEY_DERIVATION: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_128_KEY_DERIVE: CK_MECHANISM_TYPE = 923; +pub const CKM_SHAKE_256_KEY_DERIVATION: CK_MECHANISM_TYPE = 924; +pub const CKM_SHAKE_256_KEY_DERIVE: CK_MECHANISM_TYPE = 924; pub const CKM_PBE_MD2_DES_CBC: CK_MECHANISM_TYPE = 928; pub const CKM_PBE_MD5_DES_CBC: CK_MECHANISM_TYPE = 929; pub const CKM_PBE_MD5_CAST_CBC: CK_MECHANISM_TYPE = 930; pub const CKM_PBE_MD5_CAST3_CBC: CK_MECHANISM_TYPE = 931; -pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; pub const CKM_PBE_MD5_CAST128_CBC: CK_MECHANISM_TYPE = 932; -pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_CAST128_CBC: CK_MECHANISM_TYPE = 933; pub const CKM_PBE_SHA1_RC4_128: CK_MECHANISM_TYPE = 934; pub const CKM_PBE_SHA1_RC4_40: CK_MECHANISM_TYPE = 935; @@ -403,6 +588,13 @@ pub const CKM_KIP_DERIVE: CK_MECHANISM_TYPE = 1296; pub const CKM_KIP_WRAP: CK_MECHANISM_TYPE = 1297; pub const CKM_KIP_MAC: CK_MECHANISM_TYPE = 1298; pub const CKM_CAMELLIA_KEY_GEN: CK_MECHANISM_TYPE = 1360; +pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; +pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; +pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; +pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; +pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; +pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; +pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_CAMELLIA_CTR: CK_MECHANISM_TYPE = 1368; pub const CKM_ARIA_KEY_GEN: CK_MECHANISM_TYPE = 1376; pub const CKM_ARIA_ECB: CK_MECHANISM_TYPE = 1377; @@ -433,6 +625,7 @@ pub const CKM_SKIPJACK_PRIVATE_WRAP: CK_MECHANISM_TYPE = 4105; pub const CKM_SKIPJACK_RELAYX: CK_MECHANISM_TYPE = 4106; pub const CKM_KEA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4112; pub const CKM_KEA_KEY_DERIVE: CK_MECHANISM_TYPE = 4113; +pub const CKM_KEA_DERIVE: CK_MECHANISM_TYPE = 4114; pub const CKM_FORTEZZA_TIMESTAMP: CK_MECHANISM_TYPE = 4128; pub const CKM_BATON_KEY_GEN: CK_MECHANISM_TYPE = 4144; pub const CKM_BATON_ECB128: CK_MECHANISM_TYPE = 4145; @@ -441,7 +634,6 @@ pub const CKM_BATON_CBC128: CK_MECHANISM_TYPE = 4147; pub const CKM_BATON_COUNTER: CK_MECHANISM_TYPE = 4148; pub const CKM_BATON_SHUFFLE: CK_MECHANISM_TYPE = 4149; pub const CKM_BATON_WRAP: CK_MECHANISM_TYPE = 4150; -pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_EC_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; pub const CKM_ECDSA: CK_MECHANISM_TYPE = 4161; pub const CKM_ECDSA_SHA1: CK_MECHANISM_TYPE = 4162; @@ -449,6 +641,7 @@ pub const CKM_ECDSA_SHA224: CK_MECHANISM_TYPE = 4163; pub const CKM_ECDSA_SHA256: CK_MECHANISM_TYPE = 4164; pub const CKM_ECDSA_SHA384: CK_MECHANISM_TYPE = 4165; pub const CKM_ECDSA_SHA512: CK_MECHANISM_TYPE = 4166; +pub const CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS: CK_MECHANISM_TYPE = 5131; pub const CKM_ECDH1_DERIVE: CK_MECHANISM_TYPE = 4176; pub const CKM_ECDH1_COFACTOR_DERIVE: CK_MECHANISM_TYPE = 4177; pub const CKM_ECMQV_DERIVE: CK_MECHANISM_TYPE = 4178; @@ -461,6 +654,8 @@ pub const CKM_JUNIPER_COUNTER: CK_MECHANISM_TYPE = 4195; pub const CKM_JUNIPER_SHUFFLE: CK_MECHANISM_TYPE = 4196; pub const CKM_JUNIPER_WRAP: CK_MECHANISM_TYPE = 4197; pub const CKM_FASTHASH: CK_MECHANISM_TYPE = 4208; +pub const CKM_AES_XTS: CK_MECHANISM_TYPE = 4209; +pub const CKM_AES_XTS_KEY_GEN: CK_MECHANISM_TYPE = 4210; pub const CKM_AES_KEY_GEN: CK_MECHANISM_TYPE = 4224; pub const CKM_AES_ECB: CK_MECHANISM_TYPE = 4225; pub const CKM_AES_CBC: CK_MECHANISM_TYPE = 4226; @@ -500,94 +695,116 @@ pub const CKM_GOST28147_ECB: CK_MECHANISM_TYPE = 4641; pub const CKM_GOST28147: CK_MECHANISM_TYPE = 4642; pub const CKM_GOST28147_MAC: CK_MECHANISM_TYPE = 4643; pub const CKM_GOST28147_KEY_WRAP: CK_MECHANISM_TYPE = 4644; +pub const CKM_CHACHA20_KEY_GEN: CK_MECHANISM_TYPE = 4645; +pub const CKM_CHACHA20: CK_MECHANISM_TYPE = 4646; +pub const CKM_POLY1305_KEY_GEN: CK_MECHANISM_TYPE = 4647; +pub const CKM_POLY1305: CK_MECHANISM_TYPE = 4648; pub const CKM_DSA_PARAMETER_GEN: CK_MECHANISM_TYPE = 8192; pub const CKM_DH_PKCS_PARAMETER_GEN: CK_MECHANISM_TYPE = 8193; pub const CKM_X9_42_DH_PARAMETER_GEN: CK_MECHANISM_TYPE = 8194; +pub const CKM_DSA_PROBABILISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_PROBABLISTIC_PARAMETER_GEN: CK_MECHANISM_TYPE = 8195; pub const CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN: CK_MECHANISM_TYPE = 8196; +pub const CKM_DSA_FIPS_G_GEN: CK_MECHANISM_TYPE = 8197; pub const CKM_AES_OFB: CK_MECHANISM_TYPE = 8452; pub const CKM_AES_CFB64: CK_MECHANISM_TYPE = 8453; pub const CKM_AES_CFB8: CK_MECHANISM_TYPE = 8454; pub const CKM_AES_CFB128: CK_MECHANISM_TYPE = 8455; pub const CKM_AES_CFB1: CK_MECHANISM_TYPE = 8456; -pub const CKM_SHA224: CK_MECHANISM_TYPE = 597; -pub const CKM_SHA224_HMAC: CK_MECHANISM_TYPE = 598; -pub const CKM_SHA224_HMAC_GENERAL: CK_MECHANISM_TYPE = 599; -pub const CKM_SHA224_RSA_PKCS: CK_MECHANISM_TYPE = 70; -pub const CKM_SHA224_RSA_PKCS_PSS: CK_MECHANISM_TYPE = 71; -pub const CKM_SHA224_KEY_DERIVATION: CK_MECHANISM_TYPE = 918; -pub const CKM_CAMELLIA_ECB: CK_MECHANISM_TYPE = 1361; -pub const CKM_CAMELLIA_CBC: CK_MECHANISM_TYPE = 1362; -pub const CKM_CAMELLIA_MAC: CK_MECHANISM_TYPE = 1363; -pub const CKM_CAMELLIA_MAC_GENERAL: CK_MECHANISM_TYPE = 1364; -pub const CKM_CAMELLIA_CBC_PAD: CK_MECHANISM_TYPE = 1365; -pub const CKM_CAMELLIA_ECB_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1366; -pub const CKM_CAMELLIA_CBC_ENCRYPT_DATA: CK_MECHANISM_TYPE = 1367; pub const CKM_AES_KEY_WRAP: CK_MECHANISM_TYPE = 8457; pub const CKM_AES_KEY_WRAP_PAD: CK_MECHANISM_TYPE = 8458; +pub const CKM_AES_KEY_WRAP_KWP: CK_MECHANISM_TYPE = 8459; pub const CKM_RSA_PKCS_TPM_1_1: CK_MECHANISM_TYPE = 16385; pub const CKM_RSA_PKCS_OAEP_TPM_1_1: CK_MECHANISM_TYPE = 16386; +pub const CKM_SHA_1_KEY_GEN: CK_MECHANISM_TYPE = 16387; +pub const CKM_SHA224_KEY_GEN: CK_MECHANISM_TYPE = 16388; +pub const CKM_SHA256_KEY_GEN: CK_MECHANISM_TYPE = 16389; +pub const CKM_SHA384_KEY_GEN: CK_MECHANISM_TYPE = 16390; +pub const CKM_SHA512_KEY_GEN: CK_MECHANISM_TYPE = 16391; +pub const CKM_SHA512_224_KEY_GEN: CK_MECHANISM_TYPE = 16392; +pub const CKM_SHA512_256_KEY_GEN: CK_MECHANISM_TYPE = 16393; +pub const CKM_SHA512_T_KEY_GEN: CK_MECHANISM_TYPE = 16394; +pub const CKM_NULL: CK_MECHANISM_TYPE = 16395; +pub const CKM_BLAKE2B_160: CK_MECHANISM_TYPE = 16396; +pub const CKM_BLAKE2B_160_HMAC: CK_MECHANISM_TYPE = 16397; +pub const CKM_BLAKE2B_160_HMAC_GENERAL: CK_MECHANISM_TYPE = 16398; +pub const CKM_BLAKE2B_160_KEY_DERIVE: CK_MECHANISM_TYPE = 16399; +pub const CKM_BLAKE2B_160_KEY_GEN: CK_MECHANISM_TYPE = 16400; +pub const CKM_BLAKE2B_256: CK_MECHANISM_TYPE = 16401; +pub const CKM_BLAKE2B_256_HMAC: CK_MECHANISM_TYPE = 16402; +pub const CKM_BLAKE2B_256_HMAC_GENERAL: CK_MECHANISM_TYPE = 16403; +pub const CKM_BLAKE2B_256_KEY_DERIVE: CK_MECHANISM_TYPE = 16404; +pub const CKM_BLAKE2B_256_KEY_GEN: CK_MECHANISM_TYPE = 16405; +pub const CKM_BLAKE2B_384: CK_MECHANISM_TYPE = 16406; +pub const CKM_BLAKE2B_384_HMAC: CK_MECHANISM_TYPE = 16407; +pub const CKM_BLAKE2B_384_HMAC_GENERAL: CK_MECHANISM_TYPE = 16408; +pub const CKM_BLAKE2B_384_KEY_DERIVE: CK_MECHANISM_TYPE = 16409; +pub const CKM_BLAKE2B_384_KEY_GEN: CK_MECHANISM_TYPE = 16410; +pub const CKM_BLAKE2B_512: CK_MECHANISM_TYPE = 16411; +pub const CKM_BLAKE2B_512_HMAC: CK_MECHANISM_TYPE = 16412; +pub const CKM_BLAKE2B_512_HMAC_GENERAL: CK_MECHANISM_TYPE = 16413; +pub const CKM_BLAKE2B_512_KEY_DERIVE: CK_MECHANISM_TYPE = 16414; +pub const CKM_BLAKE2B_512_KEY_GEN: CK_MECHANISM_TYPE = 16415; +pub const CKM_SALSA20: CK_MECHANISM_TYPE = 16416; +pub const CKM_CHACHA20_POLY1305: CK_MECHANISM_TYPE = 16417; +pub const CKM_SALSA20_POLY1305: CK_MECHANISM_TYPE = 16418; +pub const CKM_X3DH_INITIALIZE: CK_MECHANISM_TYPE = 16419; +pub const CKM_X3DH_RESPOND: CK_MECHANISM_TYPE = 16420; +pub const CKM_X2RATCHET_INITIALIZE: CK_MECHANISM_TYPE = 16421; +pub const CKM_X2RATCHET_RESPOND: CK_MECHANISM_TYPE = 16422; +pub const CKM_X2RATCHET_ENCRYPT: CK_MECHANISM_TYPE = 16423; +pub const CKM_X2RATCHET_DECRYPT: CK_MECHANISM_TYPE = 16424; +pub const CKM_XEDDSA: CK_MECHANISM_TYPE = 16425; +pub const CKM_HKDF_DERIVE: CK_MECHANISM_TYPE = 16426; +pub const CKM_HKDF_DATA: CK_MECHANISM_TYPE = 16427; +pub const CKM_HKDF_KEY_GEN: CK_MECHANISM_TYPE = 16428; +pub const CKM_SALSA20_KEY_GEN: CK_MECHANISM_TYPE = 16429; +pub const CKM_ECDSA_SHA3_224: CK_MECHANISM_TYPE = 4167; +pub const CKM_ECDSA_SHA3_256: CK_MECHANISM_TYPE = 4168; +pub const CKM_ECDSA_SHA3_384: CK_MECHANISM_TYPE = 4169; +pub const CKM_ECDSA_SHA3_512: CK_MECHANISM_TYPE = 4170; pub const CKM_EC_EDWARDS_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4181; pub const CKM_EC_MONTGOMERY_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4182; pub const CKM_EDDSA: CK_MECHANISM_TYPE = 4183; -pub const CK_OTP_FORMAT_DECIMAL: CK_ULONG = 0; -pub const CK_OTP_FORMAT_HEXADECIMAL: CK_ULONG = 1; -pub const CK_OTP_FORMAT_ALPHANUMERIC: CK_ULONG = 2; -pub const CK_OTP_FORMAT_BINARY: CK_ULONG = 3; -pub const CK_OTP_PARAM_IGNORED: CK_ULONG = 0; -pub const CK_OTP_PARAM_OPTIONAL: CK_ULONG = 1; -pub const CK_OTP_PARAM_MANDATORY: CK_ULONG = 2; -pub const CK_OTP_VALUE: CK_ULONG = 0; -pub const CK_OTP_PIN: CK_ULONG = 1; -pub const CK_OTP_CHALLENGE: CK_ULONG = 2; -pub const CK_OTP_TIME: CK_ULONG = 3; -pub const CK_OTP_COUNTER: CK_ULONG = 4; -pub const CK_OTP_FLAGS: CK_ULONG = 5; -pub const CK_OTP_OUTPUT_LENGTH: CK_ULONG = 6; -pub const CK_OTP_FORMAT: CK_ULONG = 7; -pub const CKF_NEXT_OTP: CK_FLAGS = 1; -pub const CKF_EXCLUDE_TIME: CK_FLAGS = 2; -pub const CKF_EXCLUDE_COUNTER: CK_FLAGS = 4; -pub const CKF_EXCLUDE_CHALLENGE: CK_FLAGS = 8; -pub const CKF_EXCLUDE_PIN: CK_FLAGS = 16; -pub const CKF_USER_FRIENDLY_OTP: CK_FLAGS = 32; +pub const CKM_SP800_108_COUNTER_KDF: CK_MECHANISM_TYPE = 940; +pub const CKM_SP800_108_FEEDBACK_KDF: CK_MECHANISM_TYPE = 941; +pub const CKM_SP800_108_DOUBLE_PIPELINE_KDF: CK_MECHANISM_TYPE = 942; +pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 2147483648; +pub const CKM_CAST5_KEY_GEN: CK_MECHANISM_TYPE = 800; +pub const CKM_CAST5_CBC: CK_MECHANISM_TYPE = 802; +pub const CKM_CAST5_MAC: CK_MECHANISM_TYPE = 803; +pub const CKM_CAST5_MAC_GENERAL: CK_MECHANISM_TYPE = 804; +pub const CKM_CAST5_CBC_PAD: CK_MECHANISM_TYPE = 805; +pub const CKM_PBE_MD5_CAST5_CBC: CK_MECHANISM_TYPE = 932; +pub const CKM_PBE_SHA1_CAST5_CBC: CK_MECHANISM_TYPE = 933; +pub const CKM_ECDSA_KEY_PAIR_GEN: CK_MECHANISM_TYPE = 4160; +pub const CKN_SURRENDER: CK_NOTIFICATION = 0; pub const CKN_OTP_CHANGED: CK_NOTIFICATION = 1; -pub const CKG_MGF1_SHA1: CK_RSA_PKCS_MGF_TYPE = 1; -pub const CKG_MGF1_SHA224: CK_RSA_PKCS_MGF_TYPE = 5; -pub const CKG_MGF1_SHA256: CK_RSA_PKCS_MGF_TYPE = 2; -pub const CKG_MGF1_SHA384: CK_RSA_PKCS_MGF_TYPE = 3; -pub const CKG_MGF1_SHA512: CK_RSA_PKCS_MGF_TYPE = 4; -pub const CKD_NULL: CK_EC_KDF_TYPE = 1; -pub const CKD_SHA1_KDF: CK_EC_KDF_TYPE = 2; -pub const CKD_SHA1_KDF_ASN1: CK_EC_KDF_TYPE = 3; -pub const CKD_SHA1_KDF_CONCATENATE: CK_EC_KDF_TYPE = 4; -pub const CKD_SHA224_KDF: CK_EC_KDF_TYPE = 5; -pub const CKD_SHA256_KDF: CK_EC_KDF_TYPE = 6; -pub const CKD_SHA384_KDF: CK_EC_KDF_TYPE = 7; -pub const CKD_SHA512_KDF: CK_EC_KDF_TYPE = 8; -pub const CKD_CPDIVERSIFY_KDF: CK_EC_KDF_TYPE = 9; -pub const CKF_HW: CK_FLAGS = 1; -pub const CKF_ENCRYPT: CK_FLAGS = 256; -pub const CKF_DECRYPT: CK_FLAGS = 512; -pub const CKF_DIGEST: CK_FLAGS = 1024; -pub const CKF_SIGN: CK_FLAGS = 2048; -pub const CKF_SIGN_RECOVER: CK_FLAGS = 4096; -pub const CKF_VERIFY: CK_FLAGS = 8192; -pub const CKF_VERIFY_RECOVER: CK_FLAGS = 16384; -pub const CKF_GENERATE: CK_FLAGS = 32768; -pub const CKF_GENERATE_KEY_PAIR: CK_FLAGS = 65536; -pub const CKF_WRAP: CK_FLAGS = 131072; -pub const CKF_UNWRAP: CK_FLAGS = 262144; -pub const CKF_DERIVE: CK_FLAGS = 524288; -pub const CKF_EC_F_P: CK_FLAGS = 1048576; -pub const CKF_EC_F_2M: CK_FLAGS = 2097152; -pub const CKF_EC_ECPARAMETERS: CK_FLAGS = 4194304; -pub const CKF_EC_NAMEDCURVE: CK_FLAGS = 8388608; -pub const CKF_EC_UNCOMPRESS: CK_FLAGS = 16777216; -pub const CKF_EC_COMPRESS: CK_FLAGS = 33554432; -pub const CKF_DONT_BLOCK: CK_FLAGS = 1; -pub const CKF_LIBRARY_CANT_CREATE_OS_THREADS: CK_FLAGS = 1; -pub const CKF_OS_LOCKING_OK: CK_FLAGS = 2; +pub const CKO_DATA: CK_OBJECT_CLASS = 0; +pub const CKO_CERTIFICATE: CK_OBJECT_CLASS = 1; +pub const CKO_PUBLIC_KEY: CK_OBJECT_CLASS = 2; +pub const CKO_PRIVATE_KEY: CK_OBJECT_CLASS = 3; +pub const CKO_SECRET_KEY: CK_OBJECT_CLASS = 4; +pub const CKO_HW_FEATURE: CK_OBJECT_CLASS = 5; +pub const CKO_DOMAIN_PARAMETERS: CK_OBJECT_CLASS = 6; +pub const CKO_MECHANISM: CK_OBJECT_CLASS = 7; +pub const CKO_OTP_KEY: CK_OBJECT_CLASS = 8; +pub const CKO_PROFILE: CK_OBJECT_CLASS = 9; +pub const CKO_VENDOR_DEFINED: CK_OBJECT_CLASS = 2147483648; +pub const CKP_INVALID_ID: CK_PROFILE_ID = 0; +pub const CKP_BASELINE_PROVIDER: CK_PROFILE_ID = 1; +pub const CKP_EXTENDED_PROVIDER: CK_PROFILE_ID = 2; +pub const CKP_AUTHENTICATION_TOKEN: CK_PROFILE_ID = 3; +pub const CKP_PUBLIC_CERTIFICATES_TOKEN: CK_PROFILE_ID = 4; +pub const CKP_VENDOR_DEFINED: CK_PROFILE_ID = 2147483648; +pub const CKP_PKCS5_PBKD2_HMAC_SHA1: CK_PROFILE_ID = 1; +pub const CKP_PKCS5_PBKD2_HMAC_GOSTR3411: CK_PROFILE_ID = 2; +pub const CKP_PKCS5_PBKD2_HMAC_SHA224: CK_PROFILE_ID = 3; +pub const CKP_PKCS5_PBKD2_HMAC_SHA256: CK_PROFILE_ID = 4; +pub const CKP_PKCS5_PBKD2_HMAC_SHA384: CK_PROFILE_ID = 5; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512: CK_PROFILE_ID = 6; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_224: CK_PROFILE_ID = 7; +pub const CKP_PKCS5_PBKD2_HMAC_SHA512_256: CK_PROFILE_ID = 8; pub const CKR_OK: CK_RV = 0; pub const CKR_CANCEL: CK_RV = 1; pub const CKR_HOST_MEMORY: CK_RV = 2; @@ -610,6 +827,7 @@ pub const CKR_DEVICE_MEMORY: CK_RV = 49; pub const CKR_DEVICE_REMOVED: CK_RV = 50; pub const CKR_ENCRYPTED_DATA_INVALID: CK_RV = 64; pub const CKR_ENCRYPTED_DATA_LEN_RANGE: CK_RV = 65; +pub const CKR_AEAD_DECRYPT_FAILED: CK_RV = 66; pub const CKR_FUNCTION_CANCELED: CK_RV = 80; pub const CKR_FUNCTION_NOT_PARALLEL: CK_RV = 81; pub const CKR_FUNCTION_NOT_SUPPORTED: CK_RV = 84; @@ -665,6 +883,7 @@ pub const CKR_WRAPPING_KEY_TYPE_INCONSISTENT: CK_RV = 277; pub const CKR_RANDOM_SEED_NOT_SUPPORTED: CK_RV = 288; pub const CKR_RANDOM_NO_RNG: CK_RV = 289; pub const CKR_DOMAIN_PARAMS_INVALID: CK_RV = 304; +pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 320; pub const CKR_BUFFER_TOO_SMALL: CK_RV = 336; pub const CKR_SAVED_STATE_INVALID: CK_RV = 352; pub const CKR_INFORMATION_SENSITIVE: CK_RV = 368; @@ -675,211 +894,407 @@ pub const CKR_MUTEX_BAD: CK_RV = 416; pub const CKR_MUTEX_NOT_LOCKED: CK_RV = 417; pub const CKR_NEW_PIN_MODE: CK_RV = 432; pub const CKR_NEXT_OTP: CK_RV = 433; -pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 448; -pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 449; -pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 450; -pub const CKR_PIN_TOO_WEAK: CK_RV = 451; -pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 452; +pub const CKR_EXCEEDED_MAX_ITERATIONS: CK_RV = 437; +pub const CKR_FIPS_SELF_TEST_FAILED: CK_RV = 438; +pub const CKR_LIBRARY_LOAD_FAILED: CK_RV = 439; +pub const CKR_PIN_TOO_WEAK: CK_RV = 440; +pub const CKR_PUBLIC_KEY_INVALID: CK_RV = 441; pub const CKR_FUNCTION_REJECTED: CK_RV = 512; +pub const CKR_TOKEN_RESOURCE_EXCEEDED: CK_RV = 513; +pub const CKR_OPERATION_CANCEL_FAILED: CK_RV = 514; +pub const CKR_VENDOR_DEFINED: CK_RV = 2147483648; +pub const CKS_RO_PUBLIC_SESSION: CK_STATE = 0; +pub const CKS_RO_USER_FUNCTIONS: CK_STATE = 1; +pub const CKS_RW_PUBLIC_SESSION: CK_STATE = 2; +pub const CKS_RW_USER_FUNCTIONS: CK_STATE = 3; +pub const CKS_RW_SO_FUNCTIONS: CK_STATE = 4; +pub const CKU_SO: CK_USER_TYPE = 0; +pub const CKU_USER: CK_USER_TYPE = 1; +pub const CKU_CONTEXT_SPECIFIC: CK_USER_TYPE = 2; pub const CKZ_DATA_SPECIFIED: CK_RSA_PKCS_OAEP_SOURCE_TYPE = 1; -pub const CK_FALSE: CK_BBOOL = 0; -pub const CK_TRUE: CK_BBOOL = 1; -pub const FALSE: u32 = 0; -pub const TRUE: u32 = 1; -pub type CK_FLAGS = ::std::os::raw::c_ulong; +pub const CKZ_SALT_SPECIFIED: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = 1; +pub type CK_BBOOL = ::std::os::raw::c_uchar; +pub type CK_BYTE = ::std::os::raw::c_uchar; +pub type CK_CHAR = ::std::os::raw::c_uchar; +pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; +pub type CK_ULONG = ::std::os::raw::c_ulong; +pub type CK_BBOOL_PTR = *mut CK_BBOOL; +pub type CK_BYTE_PTR = *mut CK_BYTE; +pub type CK_CHAR_PTR = *mut CK_CHAR; +pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; +pub type CK_ULONG_PTR = *mut CK_ULONG; +pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; +pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; +pub type CK_ATTRIBUTE_TYPE = CK_ULONG; +pub type CK_ATTRIBUTE_TYPE_PTR = *mut CK_ATTRIBUTE_TYPE; +pub type CK_CERTIFICATE_CATEGORY = CK_ULONG; +pub type CK_CERTIFICATE_CATEGORY_PTR = *mut CK_CERTIFICATE_CATEGORY; +pub type CK_CERTIFICATE_TYPE = CK_ULONG; +pub type CK_CERTIFICATE_TYPE_PTR = *mut CK_CERTIFICATE_TYPE; +pub type CK_EC_KDF_TYPE = CK_ULONG; +pub type CK_EC_KDF_TYPE_PTR = *mut CK_EC_KDF_TYPE; +pub type CK_EXTRACT_PARAMS = CK_ULONG; +pub type CK_EXTRACT_PARAMS_PTR = *mut CK_EXTRACT_PARAMS; +pub type CK_FLAGS = CK_ULONG; +pub type CK_FLAGS_PTR = *mut CK_FLAGS; +pub type CK_GENERATOR_FUNCTION = CK_ULONG; +pub type CK_GENERATOR_FUNCTION_PTR = *mut CK_GENERATOR_FUNCTION; +pub type CK_HW_FEATURE_TYPE = CK_ULONG; +pub type CK_HW_FEATURE_TYPE_PTR = *mut CK_HW_FEATURE_TYPE; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN = CK_ULONG; +pub type CK_JAVA_MIDP_SECURITY_DOMAIN_PTR = *mut CK_JAVA_MIDP_SECURITY_DOMAIN; +pub type CK_KEY_TYPE = CK_ULONG; +pub type CK_KEY_TYPE_PTR = *mut CK_KEY_TYPE; +pub type CK_MAC_GENERAL_PARAMS = CK_ULONG; +pub type CK_MAC_GENERAL_PARAMS_PTR = *mut CK_MAC_GENERAL_PARAMS; +pub type CK_MECHANISM_TYPE = CK_ULONG; +pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; +pub type CK_NOTIFICATION = CK_ULONG; +pub type CK_NOTIFICATION_PTR = *mut CK_NOTIFICATION; +pub type CK_OBJECT_CLASS = CK_ULONG; +pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; +pub type CK_OBJECT_HANDLE = CK_ULONG; +pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; +pub type CK_OTP_PARAM_TYPE = CK_ULONG; +pub type CK_OTP_PARAM_TYPE_PTR = *mut CK_OTP_PARAM_TYPE; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE_PTR = + *mut CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE = CK_ULONG; +pub type CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE_PTR = *mut CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE; +pub type CK_PRF_DATA_TYPE = CK_ULONG; +pub type CK_PRF_DATA_TYPE_PTR = *mut CK_PRF_DATA_TYPE; +pub type CK_PROFILE_ID = CK_ULONG; +pub type CK_PROFILE_ID_PTR = *mut CK_PROFILE_ID; +pub type CK_RC2_PARAMS = CK_ULONG; +pub type CK_RC2_PARAMS_PTR = *mut CK_RC2_PARAMS; +pub type CK_RSA_PKCS_MGF_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_MGF_TYPE_PTR = *mut CK_RSA_PKCS_MGF_TYPE; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = CK_ULONG; +pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE_PTR = *mut CK_RSA_PKCS_OAEP_SOURCE_TYPE; +pub type CK_RV = CK_ULONG; +pub type CK_RV_PTR = *mut CK_RV; +pub type CK_SESSION_HANDLE = CK_ULONG; +pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; +pub type CK_SLOT_ID = CK_ULONG; +pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; +pub type CK_SP800_108_DKM_LENGTH_METHOD = CK_ULONG; +pub type CK_SP800_108_DKM_LENGTH_METHOD_PTR = *mut CK_SP800_108_DKM_LENGTH_METHOD; +pub type CK_STATE = CK_ULONG; +pub type CK_STATE_PTR = *mut CK_STATE; +pub type CK_USER_TYPE = CK_ULONG; +pub type CK_USER_TYPE_PTR = *mut CK_USER_TYPE; +pub type CK_X2RATCHET_KDF_TYPE = CK_ULONG; +pub type CK_X2RATCHET_KDF_TYPE_PTR = *mut CK_X2RATCHET_KDF_TYPE; +pub type CK_X3DH_KDF_TYPE = CK_ULONG; +pub type CK_X3DH_KDF_TYPE_PTR = *mut CK_X3DH_KDF_TYPE; +pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; +pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; +pub type CK_XEDDSA_HASH_TYPE = CK_ULONG; +pub type CK_XEDDSA_HASH_TYPE_PTR = *mut CK_XEDDSA_HASH_TYPE; +pub type CK_ATTRIBUTE_PTR = *mut CK_ATTRIBUTE; +pub type CK_ATTRIBUTE_PTR_PTR = *mut *mut CK_ATTRIBUTE; +pub type CK_C_INITIALIZE_ARGS_PTR = *mut CK_C_INITIALIZE_ARGS; +pub type CK_C_INITIALIZE_ARGS_PTR_PTR = *mut *mut CK_C_INITIALIZE_ARGS; +pub type CK_DATE_PTR = *mut CK_DATE; +pub type CK_DATE_PTR_PTR = *mut *mut CK_DATE; +pub type CK_DERIVED_KEY_PTR = *mut CK_DERIVED_KEY; +pub type CK_DERIVED_KEY_PTR_PTR = *mut *mut CK_DERIVED_KEY; +pub type CK_FUNCTION_LIST_PTR = *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut CK_FUNCTION_LIST; +pub type CK_FUNCTION_LIST_3_0_PTR = *mut CK_FUNCTION_LIST_3_0; +pub type CK_FUNCTION_LIST_3_0_PTR_PTR = *mut *mut CK_FUNCTION_LIST_3_0; +pub type CK_INFO_PTR = *mut CK_INFO; +pub type CK_INFO_PTR_PTR = *mut *mut CK_INFO; +pub type CK_INTERFACE_PTR = *mut CK_INTERFACE; +pub type CK_INTERFACE_PTR_PTR = *mut *mut CK_INTERFACE; +pub type CK_MECHANISM_PTR = *mut CK_MECHANISM; +pub type CK_MECHANISM_PTR_PTR = *mut *mut CK_MECHANISM; +pub type CK_MECHANISM_INFO_PTR = *mut CK_MECHANISM_INFO; +pub type CK_MECHANISM_INFO_PTR_PTR = *mut *mut CK_MECHANISM_INFO; +pub type CK_SESSION_INFO_PTR = *mut CK_SESSION_INFO; +pub type CK_SESSION_INFO_PTR_PTR = *mut *mut CK_SESSION_INFO; +pub type CK_SLOT_INFO_PTR = *mut CK_SLOT_INFO; +pub type CK_SLOT_INFO_PTR_PTR = *mut *mut CK_SLOT_INFO; +pub type CK_TOKEN_INFO_PTR = *mut CK_TOKEN_INFO; +pub type CK_TOKEN_INFO_PTR_PTR = *mut *mut CK_TOKEN_INFO; +pub type CK_VERSION_PTR = *mut CK_VERSION; +pub type CK_VERSION_PTR_PTR = *mut *mut CK_VERSION; +pub type CK_NOTIFY = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_NOTIFICATION, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV, +>; +pub type CK_CREATEMUTEX = + ::std::option::Option CK_RV>; +pub type CK_DESTROYMUTEX = + ::std::option::Option CK_RV>; +pub type CK_LOCKMUTEX = + ::std::option::Option CK_RV>; +pub type CK_UNLOCKMUTEX = + ::std::option::Option CK_RV>; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_VERSION { - pub major: ::std::os::raw::c_uchar, - pub minor: ::std::os::raw::c_uchar, +#[derive(Debug, Copy, Clone)] +pub struct CK_ATTRIBUTE { + pub type_: CK_ATTRIBUTE_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_VERSION() { - const UNINIT: ::std::mem::MaybeUninit<_CK_VERSION> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_ATTRIBUTE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_VERSION>(), - 2usize, - concat!("Size of: ", stringify!(_CK_VERSION)) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - ::std::mem::align_of::<_CK_VERSION>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_VERSION)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ATTRIBUTE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(major) + stringify!(type_) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, - 1usize, + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_VERSION), + stringify!(CK_ATTRIBUTE), "::", - stringify!(minor) + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ATTRIBUTE), + "::", + stringify!(ulValueLen) ) ); } +impl Default for CK_ATTRIBUTE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_INFO { - pub cryptokiVersion: _CK_VERSION, - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], +#[derive(Debug, Copy, Clone)] +pub struct CK_C_INITIALIZE_ARGS { + pub CreateMutex: CK_CREATEMUTEX, + pub DestroyMutex: CK_DESTROYMUTEX, + pub LockMutex: CK_LOCKMUTEX, + pub UnlockMutex: CK_UNLOCKMUTEX, pub flags: CK_FLAGS, - pub libraryDescription: [::std::os::raw::c_uchar; 32usize], - pub libraryVersion: _CK_VERSION, + pub pReserved: *mut ::std::os::raw::c_void, } #[test] -fn bindgen_test_layout__CK_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_C_INITIALIZE_ARGS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_INFO>(), - 88usize, - concat!("Size of: ", stringify!(_CK_INFO)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - ::std::mem::align_of::<_CK_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_INFO)) + concat!("Alignment of ", stringify!(CK_C_INITIALIZE_ARGS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(cryptokiVersion) + stringify!(CreateMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 2usize, + unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(manufacturerID) + stringify!(DestroyMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 40usize, + unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(flags) + stringify!(LockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, - 48usize, + unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryDescription) + stringify!(UnlockMutex) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_INFO), + stringify!(CK_C_INITIALIZE_ARGS), "::", - stringify!(libraryVersion) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_C_INITIALIZE_ARGS), + "::", + stringify!(pReserved) ) ); } -pub type CK_NOTIFICATION = ::std::os::raw::c_ulong; -pub const CKN_SURRENDER: ::std::os::raw::c_ulong = 0; -pub type CK_SLOT_ID = ::std::os::raw::c_ulong; +impl Default for CK_C_INITIALIZE_ARGS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_SLOT_INFO { - pub slotDescription: [::std::os::raw::c_uchar; 64usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub flags: CK_FLAGS, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_DATE { + pub year: [CK_CHAR; 4usize], + pub month: [CK_CHAR; 2usize], + pub day: [CK_CHAR; 2usize], } #[test] -fn bindgen_test_layout__CK_SLOT_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SLOT_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_DATE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SLOT_INFO>(), - 112usize, - concat!("Size of: ", stringify!(_CK_SLOT_INFO)) + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_DATE)) ); assert_eq!( - ::std::mem::align_of::<_CK_SLOT_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_SLOT_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_DATE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(slotDescription) + stringify!(year) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 64usize, + unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, + 4usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(manufacturerID) + stringify!(month) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, + 6usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DATE), "::", - stringify!(flags) + stringify!(day) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DERIVED_KEY { + pub pTemplate: *mut CK_ATTRIBUTE, + pub ulAttributeCount: CK_ULONG, + pub phKey: *mut CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_DERIVED_KEY() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 104usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DERIVED_KEY)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTemplate) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(hardwareVersion) + stringify!(pTemplate) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 106usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulAttributeCount) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_SLOT_INFO), + stringify!(CK_DERIVED_KEY), "::", - stringify!(firmwareVersion) + stringify!(ulAttributeCount) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DERIVED_KEY), + "::", + stringify!(phKey) ) ); } -impl Default for _CK_SLOT_INFO { +impl Default for CK_DERIVED_KEY { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -888,258 +1303,323 @@ impl Default for _CK_SLOT_INFO { } } } -pub const CKF_TOKEN_PRESENT: ::std::os::raw::c_ulong = 1; -pub const CKF_REMOVABLE_DEVICE: ::std::os::raw::c_ulong = 2; -pub const CKF_HW_SLOT: ::std::os::raw::c_ulong = 4; -pub const CKF_ARRAY_ATTRIBUTE: ::std::os::raw::c_ulong = 1073741824; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_TOKEN_INFO { - pub label: [::std::os::raw::c_uchar; 32usize], - pub manufacturerID: [::std::os::raw::c_uchar; 32usize], - pub model: [::std::os::raw::c_uchar; 16usize], - pub serialNumber: [::std::os::raw::c_uchar; 16usize], - pub flags: CK_FLAGS, - pub ulMaxSessionCount: ::std::os::raw::c_ulong, - pub ulSessionCount: ::std::os::raw::c_ulong, - pub ulMaxRwSessionCount: ::std::os::raw::c_ulong, - pub ulRwSessionCount: ::std::os::raw::c_ulong, - pub ulMaxPinLen: ::std::os::raw::c_ulong, - pub ulMinPinLen: ::std::os::raw::c_ulong, - pub ulTotalPublicMemory: ::std::os::raw::c_ulong, - pub ulFreePublicMemory: ::std::os::raw::c_ulong, - pub ulTotalPrivateMemory: ::std::os::raw::c_ulong, - pub ulFreePrivateMemory: ::std::os::raw::c_ulong, - pub hardwareVersion: _CK_VERSION, - pub firmwareVersion: _CK_VERSION, - pub utcTime: [::std::os::raw::c_uchar; 16usize], +pub struct CK_VERSION { + pub major: CK_BYTE, + pub minor: CK_BYTE, } #[test] -fn bindgen_test_layout__CK_TOKEN_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_TOKEN_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_VERSION() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_TOKEN_INFO>(), - 208usize, - concat!("Size of: ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::size_of::(), + 2usize, + concat!("Size of: ", stringify!(CK_VERSION)) ); assert_eq!( - ::std::mem::align_of::<_CK_TOKEN_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_TOKEN_INFO)) + ::std::mem::align_of::(), + 1usize, + concat!("Alignment of ", stringify!(CK_VERSION)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).major) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(label) + stringify!(major) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).minor) as usize - ptr as usize }, + 1usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_VERSION), "::", - stringify!(manufacturerID) + stringify!(minor) ) ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_INFO { + pub cryptokiVersion: CK_VERSION, + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub libraryDescription: [CK_UTF8CHAR; 32usize], + pub libraryVersion: CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, - 64usize, + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cryptokiVersion) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(model) + stringify!(cryptokiVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, - 80usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 2usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(serialNumber) + stringify!(manufacturerID) ) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 96usize, + 40usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, - 104usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryDescription) as usize - ptr as usize }, + 48usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulMaxSessionCount) + stringify!(libraryDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, - 112usize, + unsafe { ::std::ptr::addr_of!((*ptr).libraryVersion) as usize - ptr as usize }, + 80usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INFO), "::", - stringify!(ulSessionCount) + stringify!(libraryVersion) ) ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_INTERFACE { + pub pInterfaceName: *mut CK_CHAR, + pub pFunctionList: *mut ::std::os::raw::c_void, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_INTERFACE() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, - 120usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulMaxRwSessionCount) - ) + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, - 128usize, - concat!( - "Offset of field: ", - stringify!(_CK_TOKEN_INFO), - "::", - stringify!(ulRwSessionCount) - ) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_INTERFACE)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, - 136usize, + unsafe { ::std::ptr::addr_of!((*ptr).pInterfaceName) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMaxPinLen) + stringify!(pInterfaceName) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, - 144usize, + unsafe { ::std::ptr::addr_of!((*ptr).pFunctionList) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulMinPinLen) + stringify!(pFunctionList) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, - 152usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_INTERFACE), "::", - stringify!(ulTotalPublicMemory) + stringify!(flags) ) ); +} +impl Default for CK_INTERFACE { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_MECHANISM { + pub mechanism: CK_MECHANISM_TYPE, + pub pParameter: *mut ::std::os::raw::c_void, + pub ulParameterLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, - 160usize, + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePublicMemory) + stringify!(mechanism) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, - 168usize, + unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulTotalPrivateMemory) + stringify!(pParameter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, - 176usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM), "::", - stringify!(ulFreePrivateMemory) + stringify!(ulParameterLen) ) ); +} +impl Default for CK_MECHANISM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_MECHANISM_INFO { + pub ulMinKeySize: CK_ULONG, + pub ulMaxKeySize: CK_ULONG, + pub flags: CK_FLAGS, +} +#[test] +fn bindgen_test_layout_CK_MECHANISM_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_MECHANISM_INFO)) + ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, - 184usize, + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_MECHANISM_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(hardwareVersion) + stringify!(ulMinKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, - 186usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, + 8usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(firmwareVersion) + stringify!(ulMaxKeySize) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, - 188usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(_CK_TOKEN_INFO), + stringify!(CK_MECHANISM_INFO), "::", - stringify!(utcTime) + stringify!(flags) ) ); } -pub type CK_SESSION_HANDLE = ::std::os::raw::c_ulong; -pub type CK_USER_TYPE = ::std::os::raw::c_ulong; -pub type CK_STATE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_SESSION_INFO { +pub struct CK_SESSION_INFO { pub slotID: CK_SLOT_ID, pub state: CK_STATE, pub flags: CK_FLAGS, - pub ulDeviceError: ::std::os::raw::c_ulong, + pub ulDeviceError: CK_ULONG, } #[test] -fn bindgen_test_layout__CK_SESSION_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_SESSION_INFO> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SESSION_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_SESSION_INFO>(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(_CK_SESSION_INFO)) + concat!("Size of: ", stringify!(CK_SESSION_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_SESSION_INFO>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_SESSION_INFO)) + concat!("Alignment of ", stringify!(CK_SESSION_INFO)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).slotID) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(slotID) ) @@ -1149,7 +1629,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(state) ) @@ -1159,7 +1639,7 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(flags) ) @@ -1169,71 +1649,87 @@ fn bindgen_test_layout__CK_SESSION_INFO() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_SESSION_INFO), + stringify!(CK_SESSION_INFO), "::", stringify!(ulDeviceError) ) ); } -pub type CK_OBJECT_HANDLE = ::std::os::raw::c_ulong; -pub type CK_OBJECT_CLASS = ::std::os::raw::c_ulong; -pub type CK_HW_FEATURE_TYPE = ::std::os::raw::c_ulong; -pub type CK_KEY_TYPE = ::std::os::raw::c_ulong; -pub type CK_CERTIFICATE_TYPE = ::std::os::raw::c_ulong; -pub type CK_ATTRIBUTE_TYPE = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct _CK_ATTRIBUTE { - pub type_: CK_ATTRIBUTE_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, +pub struct CK_SLOT_INFO { + pub slotDescription: [CK_UTF8CHAR; 64usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub flags: CK_FLAGS, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, } #[test] -fn bindgen_test_layout__CK_ATTRIBUTE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_ATTRIBUTE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_SLOT_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_ATTRIBUTE>(), - 24usize, - concat!("Size of: ", stringify!(_CK_ATTRIBUTE)) + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_ATTRIBUTE>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_ATTRIBUTE)) + concat!("Alignment of ", stringify!(CK_SLOT_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).slotDescription) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(type_) + stringify!(slotDescription) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(pValue) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_ATTRIBUTE), + stringify!(CK_SLOT_INFO), "::", - stringify!(ulValueLen) + stringify!(flags) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(hardwareVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 106usize, + concat!( + "Offset of field: ", + stringify!(CK_SLOT_INFO), + "::", + stringify!(firmwareVersion) ) ); } -impl Default for _CK_ATTRIBUTE { +impl Default for CK_SLOT_INFO { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1244,464 +1740,499 @@ impl Default for _CK_ATTRIBUTE { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_DATE { - pub year: [::std::os::raw::c_uchar; 4usize], - pub month: [::std::os::raw::c_uchar; 2usize], - pub day: [::std::os::raw::c_uchar; 2usize], +pub struct CK_TOKEN_INFO { + pub label: [CK_UTF8CHAR; 32usize], + pub manufacturerID: [CK_UTF8CHAR; 32usize], + pub model: [CK_UTF8CHAR; 16usize], + pub serialNumber: [CK_CHAR; 16usize], + pub flags: CK_FLAGS, + pub ulMaxSessionCount: CK_ULONG, + pub ulSessionCount: CK_ULONG, + pub ulMaxRwSessionCount: CK_ULONG, + pub ulRwSessionCount: CK_ULONG, + pub ulMaxPinLen: CK_ULONG, + pub ulMinPinLen: CK_ULONG, + pub ulTotalPublicMemory: CK_ULONG, + pub ulFreePublicMemory: CK_ULONG, + pub ulTotalPrivateMemory: CK_ULONG, + pub ulFreePrivateMemory: CK_ULONG, + pub hardwareVersion: CK_VERSION, + pub firmwareVersion: CK_VERSION, + pub utcTime: [CK_CHAR; 16usize], } #[test] -fn bindgen_test_layout__CK_DATE() { - const UNINIT: ::std::mem::MaybeUninit<_CK_DATE> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_TOKEN_INFO() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_DATE>(), - 8usize, - concat!("Size of: ", stringify!(_CK_DATE)) + ::std::mem::size_of::(), + 208usize, + concat!("Size of: ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - ::std::mem::align_of::<_CK_DATE>(), - 1usize, - concat!("Alignment of ", stringify!(_CK_DATE)) + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TOKEN_INFO)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).year) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).label) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(year) + stringify!(label) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).month) as usize - ptr as usize }, - 4usize, + unsafe { ::std::ptr::addr_of!((*ptr).manufacturerID) as usize - ptr as usize }, + 32usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(month) + stringify!(manufacturerID) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).day) as usize - ptr as usize }, - 6usize, + unsafe { ::std::ptr::addr_of!((*ptr).model) as usize - ptr as usize }, + 64usize, concat!( "Offset of field: ", - stringify!(_CK_DATE), + stringify!(CK_TOKEN_INFO), "::", - stringify!(day) + stringify!(model) ) ); -} -pub type CK_MECHANISM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_MECHANISM { - pub mechanism: CK_MECHANISM_TYPE, - pub pParameter: *mut ::std::os::raw::c_void, - pub ulParameterLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM)) - ); assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM)) + unsafe { ::std::ptr::addr_of!((*ptr).serialNumber) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(serialNumber) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mechanism) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, + 96usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(mechanism) + stringify!(flags) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParameter) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxSessionCount) as usize - ptr as usize }, + 104usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParameter) + stringify!(ulMaxSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulParameterLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulSessionCount) as usize - ptr as usize }, + 112usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulParameterLen) + stringify!(ulSessionCount) ) ); -} -impl Default for _CK_MECHANISM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct _CK_MECHANISM_INFO { - pub ulMinKeySize: ::std::os::raw::c_ulong, - pub ulMaxKeySize: ::std::os::raw::c_ulong, - pub flags: CK_FLAGS, -} -#[test] -fn bindgen_test_layout__CK_MECHANISM_INFO() { - const UNINIT: ::std::mem::MaybeUninit<_CK_MECHANISM_INFO> = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_MECHANISM_INFO>(), - 24usize, - concat!("Size of: ", stringify!(_CK_MECHANISM_INFO)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_MECHANISM_INFO>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_MECHANISM_INFO)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMinKeySize) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxRwSessionCount) as usize - ptr as usize }, + 120usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMinKeySize) + stringify!(ulMaxRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulMaxKeySize) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulRwSessionCount) as usize - ptr as usize }, + 128usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulMaxKeySize) + stringify!(ulRwSessionCount) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMaxPinLen) as usize - ptr as usize }, + 136usize, concat!( "Offset of field: ", - stringify!(_CK_MECHANISM_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(flags) + stringify!(ulMaxPinLen) ) ); -} -pub type CK_PARAM_TYPE = ::std::os::raw::c_ulong; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAM { - pub type_: CK_PARAM_TYPE, - pub pValue: *mut ::std::os::raw::c_void, - pub ulValueLen: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAM() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(CK_OTP_PARAM)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAM)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulMinPinLen) as usize - ptr as usize }, + 144usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(type_) + stringify!(ulMinPinLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPublicMemory) as usize - ptr as usize }, + 152usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pValue) + stringify!(ulTotalPublicMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePublicMemory) as usize - ptr as usize }, + 160usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAM), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulValueLen) + stringify!(ulFreePublicMemory) ) ); -} -impl Default for CK_OTP_PARAM { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_PARAMS { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_PARAMS() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_PARAMS)) - ); - assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) - ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulTotalPrivateMemory) as usize - ptr as usize }, + 168usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(ulTotalPrivateMemory) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).ulFreePrivateMemory) as usize - ptr as usize }, + 176usize, concat!( "Offset of field: ", - stringify!(CK_OTP_PARAMS), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(ulFreePrivateMemory) ) ); -} -impl Default for CK_OTP_PARAMS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct CK_OTP_SIGNATURE_INFO { - pub pParams: *mut CK_OTP_PARAM, - pub ulCount: ::std::os::raw::c_ulong, -} -#[test] -fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) - ); assert_eq!( - ::std::mem::align_of::(), - 8usize, - concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + unsafe { ::std::ptr::addr_of!((*ptr).hardwareVersion) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_TOKEN_INFO), + "::", + stringify!(hardwareVersion) + ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, - 0usize, + unsafe { ::std::ptr::addr_of!((*ptr).firmwareVersion) as usize - ptr as usize }, + 186usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(pParams) + stringify!(firmwareVersion) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).utcTime) as usize - ptr as usize }, + 188usize, concat!( "Offset of field: ", - stringify!(CK_OTP_SIGNATURE_INFO), + stringify!(CK_TOKEN_INFO), "::", - stringify!(ulCount) + stringify!(utcTime) ) ); } -impl Default for CK_OTP_SIGNATURE_INFO { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_AES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR = *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CCM_PARAMS_PTR_PTR = *mut *mut CK_AES_CCM_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR = *mut CK_AES_CTR_PARAMS; +pub type CK_AES_CTR_PARAMS_PTR_PTR = *mut *mut CK_AES_CTR_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR = *mut CK_AES_GCM_PARAMS; +pub type CK_AES_GCM_PARAMS_PTR_PTR = *mut *mut CK_AES_GCM_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_ARIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_ARIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = + *mut *mut CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR = *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CAMELLIA_CTR_PARAMS_PTR_PTR = *mut *mut CK_CAMELLIA_CTR_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR = *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_CCM_MESSAGE_PARAMS; +pub type CK_CCM_PARAMS_PTR = *mut CK_CCM_PARAMS; +pub type CK_CCM_PARAMS_PTR_PTR = *mut *mut CK_CCM_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR = *mut CK_CHACHA20_PARAMS; +pub type CK_CHACHA20_PARAMS_PTR_PTR = *mut *mut CK_CHACHA20_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR = *mut CK_CMS_SIG_PARAMS; +pub type CK_CMS_SIG_PARAMS_PTR_PTR = *mut *mut CK_CMS_SIG_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_DES_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR = *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_DSA_PARAMETER_GEN_PARAM_PTR_PTR = *mut *mut CK_DSA_PARAMETER_GEN_PARAM; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR = *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_ECDH_AES_KEY_WRAP_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH1_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR = *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECDH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECDH2_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR = *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_ECMQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_ECMQV_DERIVE_PARAMS; +pub type CK_EDDSA_PARAMS_PTR = *mut CK_EDDSA_PARAMS; +pub type CK_EDDSA_PARAMS_PTR_PTR = *mut *mut CK_EDDSA_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR = *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_MESSAGE_PARAMS_PTR_PTR = *mut *mut CK_GCM_MESSAGE_PARAMS; +pub type CK_GCM_PARAMS_PTR = *mut CK_GCM_PARAMS; +pub type CK_GCM_PARAMS_PTR_PTR = *mut *mut CK_GCM_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR = *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_DERIVE_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR = *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_GOSTR3410_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_GOSTR3410_KEY_WRAP_PARAMS; +pub type CK_HKDF_PARAMS_PTR = *mut CK_HKDF_PARAMS; +pub type CK_HKDF_PARAMS_PTR_PTR = *mut *mut CK_HKDF_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR = *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEA_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_KEA_DERIVE_PARAMS; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_DERIVATION_STRING_DATA_PTR_PTR = *mut *mut CK_KEY_DERIVATION_STRING_DATA; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR = *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KEY_WRAP_SET_OAEP_PARAMS_PTR_PTR = *mut *mut CK_KEY_WRAP_SET_OAEP_PARAMS; +pub type CK_KIP_PARAMS_PTR = *mut CK_KIP_PARAMS; +pub type CK_KIP_PARAMS_PTR_PTR = *mut *mut CK_KIP_PARAMS; +pub type CK_OTP_PARAM_PTR = *mut CK_OTP_PARAM; +pub type CK_OTP_PARAM_PTR_PTR = *mut *mut CK_OTP_PARAM; +pub type CK_OTP_PARAMS_PTR = *mut CK_OTP_PARAMS; +pub type CK_OTP_PARAMS_PTR_PTR = *mut *mut CK_OTP_PARAMS; +pub type CK_OTP_SIGNATURE_INFO_PTR = *mut CK_OTP_SIGNATURE_INFO; +pub type CK_OTP_SIGNATURE_INFO_PTR_PTR = *mut *mut CK_OTP_SIGNATURE_INFO; +pub type CK_PBE_PARAMS_PTR = *mut CK_PBE_PARAMS; +pub type CK_PBE_PARAMS_PTR_PTR = *mut *mut CK_PBE_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR = *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR = *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PKCS5_PBKD2_PARAMS2_PTR_PTR = *mut *mut CK_PKCS5_PBKD2_PARAMS2; +pub type CK_PRF_DATA_PARAM_PTR = *mut CK_PRF_DATA_PARAM; +pub type CK_PRF_DATA_PARAM_PTR_PTR = *mut *mut CK_PRF_DATA_PARAM; +pub type CK_RC2_CBC_PARAMS_PTR = *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC2_CBC_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR = *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC2_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC2_MAC_GENERAL_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR = *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_CBC_PARAMS_PTR_PTR = *mut *mut CK_RC5_CBC_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR = *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_MAC_GENERAL_PARAMS_PTR_PTR = *mut *mut CK_RC5_MAC_GENERAL_PARAMS; +pub type CK_RC5_PARAMS_PTR = *mut CK_RC5_PARAMS; +pub type CK_RC5_PARAMS_PTR_PTR = *mut *mut CK_RC5_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR = *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_AES_KEY_WRAP_PARAMS_PTR_PTR = *mut *mut CK_RSA_AES_KEY_WRAP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_OAEP_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_OAEP_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_RSA_PKCS_PSS_PARAMS_PTR_PTR = *mut *mut CK_RSA_PKCS_PSS_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR = *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_CHACHA20_POLY1305_PARAMS_PTR_PTR = + *mut *mut CK_SALSA20_CHACHA20_POLY1305_PARAMS; +pub type CK_SALSA20_PARAMS_PTR = *mut CK_SALSA20_PARAMS; +pub type CK_SALSA20_PARAMS_PTR_PTR = *mut *mut CK_SALSA20_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SEED_CBC_ENCRYPT_DATA_PARAMS_PTR_PTR = *mut *mut CK_SEED_CBC_ENCRYPT_DATA_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR = *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_PRIVATE_WRAP_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_PRIVATE_WRAP_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR = *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SKIPJACK_RELAYX_PARAMS_PTR_PTR = *mut *mut CK_SKIPJACK_RELAYX_PARAMS; +pub type CK_SP800_108_COUNTER_FORMAT_PTR = *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_COUNTER_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_COUNTER_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR = *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_DKM_LENGTH_FORMAT_PTR_PTR = *mut *mut CK_SP800_108_DKM_LENGTH_FORMAT; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR = *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_FEEDBACK_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_FEEDBACK_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR = *mut CK_SP800_108_KDF_PARAMS; +pub type CK_SP800_108_KDF_PARAMS_PTR_PTR = *mut *mut CK_SP800_108_KDF_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR = *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_INITIALIZE_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_INITIALIZE_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR = *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X2RATCHET_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X2RATCHET_RESPOND_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR = *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_INITIATE_PARAMS_PTR_PTR = *mut *mut CK_X3DH_INITIATE_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR = *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X3DH_RESPOND_PARAMS_PTR_PTR = *mut *mut CK_X3DH_RESPOND_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH1_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH1_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR = *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_DH2_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_DH2_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR = *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_X9_42_MQV_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_X9_42_MQV_DERIVE_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR = *mut CK_XEDDSA_PARAMS; +pub type CK_XEDDSA_PARAMS_PTR_PTR = *mut *mut CK_XEDDSA_PARAMS; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct specifiedParams { + _unused: [u8; 0], } -pub type CK_RSA_PKCS_MGF_TYPE = ::std::os::raw::c_ulong; +pub type specifiedParams_PTR = *mut specifiedParams; +pub type specifiedParams_PTR_PTR = *mut *mut specifiedParams; #[repr(C)] -#[derive(Debug, Default, Copy, Clone)] -pub struct ck_rsa_pkcs_pss_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub sLen: ::std::os::raw::c_ulong, +#[derive(Debug, Copy, Clone)] +pub struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_pss_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_AES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_pss_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_pss_params)) + concat!("Alignment of ", stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(hashAlg) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(mgf) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_pss_params), + stringify!(CK_AES_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(sLen) + stringify!(length) ) ); } -pub type CK_RSA_PKCS_OAEP_SOURCE_TYPE = ::std::os::raw::c_ulong; +impl Default for CK_AES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_rsa_pkcs_oaep_params { - pub hashAlg: CK_MECHANISM_TYPE, - pub mgf: CK_RSA_PKCS_MGF_TYPE, - pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, - pub pSourceData: *mut ::std::os::raw::c_void, - pub ulSourceDataLen: ::std::os::raw::c_ulong, +pub struct CK_AES_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_rsa_pkcs_oaep_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_rsa_pkcs_oaep_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_rsa_pkcs_oaep_params)) + concat!("Alignment of ", stringify!(CK_AES_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(hashAlg) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(mgf) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(source) + stringify!(ulNonceLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(pSourceData) + stringify!(pAAD) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, 32usize, concat!( "Offset of field: ", - stringify!(ck_rsa_pkcs_oaep_params), + stringify!(CK_AES_CCM_PARAMS), "::", - stringify!(ulSourceDataLen) + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_AES_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_rsa_pkcs_oaep_params { +impl Default for CK_AES_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1712,30 +2243,30 @@ impl Default for ck_rsa_pkcs_oaep_params { } #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct ck_aes_ctr_params { - pub ulCounterBits: ::std::os::raw::c_ulong, - pub cb: [::std::os::raw::c_uchar; 16usize], +pub struct CK_AES_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], } #[test] -fn bindgen_test_layout_ck_aes_ctr_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 24usize, - concat!("Size of: ", stringify!(ck_aes_ctr_params)) + concat!("Size of: ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_ctr_params)) + concat!("Alignment of ", stringify!(CK_AES_CTR_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(ulCounterBits) ) @@ -1745,7 +2276,7 @@ fn bindgen_test_layout_ck_aes_ctr_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_aes_ctr_params), + stringify!(CK_AES_CTR_PARAMS), "::", stringify!(cb) ) @@ -1753,34 +2284,34 @@ fn bindgen_test_layout_ck_aes_ctr_params() { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_gcm_params { - pub pIv: *mut ::std::os::raw::c_uchar, - pub ulIvLen: ::std::os::raw::c_ulong, - pub ulIvBits: ::std::os::raw::c_ulong, - pub pAAD: *mut ::std::os::raw::c_uchar, - pub ulAADLen: ::std::os::raw::c_ulong, - pub ulTagBits: ::std::os::raw::c_ulong, +pub struct CK_AES_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_gcm_params() { - const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_AES_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 48usize, - concat!("Size of: ", stringify!(ck_gcm_params)) + concat!("Size of: ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_gcm_params)) + concat!("Alignment of ", stringify!(CK_AES_GCM_PARAMS)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pIv) ) @@ -1790,7 +2321,7 @@ fn bindgen_test_layout_ck_gcm_params() { 8usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvLen) ) @@ -1800,7 +2331,7 @@ fn bindgen_test_layout_ck_gcm_params() { 16usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulIvBits) ) @@ -1810,7 +2341,7 @@ fn bindgen_test_layout_ck_gcm_params() { 24usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(pAAD) ) @@ -1820,7 +2351,7 @@ fn bindgen_test_layout_ck_gcm_params() { 32usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulAADLen) ) @@ -1830,13 +2361,13 @@ fn bindgen_test_layout_ck_gcm_params() { 40usize, concat!( "Offset of field: ", - stringify!(ck_gcm_params), + stringify!(CK_AES_GCM_PARAMS), "::", stringify!(ulTagBits) ) ); } -impl Default for ck_gcm_params { +impl Default for CK_AES_GCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1845,83 +2376,125 @@ impl Default for ck_gcm_params { } } } -pub type ck_ec_kdf_t = ::std::os::raw::c_ulong; #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_ecdh1_derive_params { - pub kdf: ck_ec_kdf_t, - pub ulSharedDataLen: ::std::os::raw::c_ulong, - pub pSharedData: *mut ::std::os::raw::c_uchar, - pub ulPublicDataLen: ::std::os::raw::c_ulong, - pub pPublicData: *mut ::std::os::raw::c_uchar, +pub struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_ecdh1_derive_params() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_ARIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 40usize, - concat!("Size of: ", stringify!(ck_ecdh1_derive_params)) + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_ecdh1_derive_params)) + concat!("Alignment of ", stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(kdf) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, - 8usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulSharedDataLen) + stringify!(pData) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, - 16usize, + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pSharedData) + stringify!(length) ) ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, - 24usize, +} +impl Default for CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(ulPublicDataLen) + stringify!(iv) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, - 32usize, + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, concat!( "Offset of field: ", - stringify!(ck_ecdh1_derive_params), + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), "::", - stringify!(pPublicData) + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) ) ); } -impl Default for ck_ecdh1_derive_params { +impl Default for CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1931,48 +2504,145 @@ impl Default for ck_ecdh1_derive_params { } } #[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_CAMELLIA_CTR_PARAMS { + pub ulCounterBits: CK_ULONG, + pub cb: [CK_BYTE; 16usize], +} +#[test] +fn bindgen_test_layout_CK_CAMELLIA_CTR_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CAMELLIA_CTR_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCounterBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(ulCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).cb) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CAMELLIA_CTR_PARAMS), + "::", + stringify!(cb) + ) + ); +} +#[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_key_derivation_string_data { - pub pData: *mut ::std::os::raw::c_uchar, - pub ulLen: ::std::os::raw::c_ulong, +pub struct CK_CCM_MESSAGE_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub ulNonceFixedBits: CK_ULONG, + pub nonceGenerator: CK_GENERATOR_FUNCTION, + pub pMAC: *mut CK_BYTE, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_key_derivation_string_data() { - const UNINIT: ::std::mem::MaybeUninit = +fn bindgen_test_layout_CK_CCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 16usize, - concat!("Size of: ", stringify!(ck_key_derivation_string_data)) + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_key_derivation_string_data)) + concat!("Alignment of ", stringify!(CK_CCM_MESSAGE_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(pData) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_key_derivation_string_data), + stringify!(CK_CCM_MESSAGE_PARAMS), "::", - stringify!(ulLen) + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceFixedBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulNonceFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).nonceGenerator) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(nonceGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMAC) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(pMAC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_MESSAGE_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_key_derivation_string_data { +impl Default for CK_CCM_MESSAGE_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -1983,58 +2653,90 @@ impl Default for ck_key_derivation_string_data { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_des_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 8usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CCM_PARAMS { + pub ulDataLen: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulMACLen: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_des_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), - 24usize, - concat!("Size of: ", stringify!(ck_des_cbc_encrypt_data_params)) + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_des_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CCM_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulDataLen) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(iv) + stringify!(ulDataLen) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 8usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_des_cbc_encrypt_data_params), + stringify!(CK_CCM_PARAMS), "::", - stringify!(length) + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMACLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CCM_PARAMS), + "::", + stringify!(ulMACLen) ) ); } -impl Default for ck_des_cbc_encrypt_data_params { +impl Default for CK_CCM_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2045,58 +2747,68 @@ impl Default for ck_des_cbc_encrypt_data_params { } #[repr(C)] #[derive(Debug, Copy, Clone)] -pub struct ck_aes_cbc_encrypt_data_params { - pub iv: [::std::os::raw::c_uchar; 16usize], - pub pData: *mut ::std::os::raw::c_uchar, - pub length: ::std::os::raw::c_ulong, +pub struct CK_CHACHA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub blockCounterBits: CK_ULONG, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, } #[test] -fn bindgen_test_layout_ck_aes_cbc_encrypt_data_params() { - const UNINIT: ::std::mem::MaybeUninit = - ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_CHACHA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::(), + ::std::mem::size_of::(), 32usize, - concat!("Size of: ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Size of: ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - ::std::mem::align_of::(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(ck_aes_cbc_encrypt_data_params)) + concat!("Alignment of ", stringify!(CK_CHACHA20_PARAMS)) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(iv) + stringify!(pBlockCounter) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).blockCounterBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CHACHA20_PARAMS), + "::", + stringify!(blockCounterBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, 16usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(pData) + stringify!(pNonce) ) ); assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, 24usize, concat!( "Offset of field: ", - stringify!(ck_aes_cbc_encrypt_data_params), + stringify!(CK_CHACHA20_PARAMS), "::", - stringify!(length) + stringify!(ulNonceBits) ) ); } -impl Default for ck_aes_cbc_encrypt_data_params { +impl Default for CK_CHACHA20_PARAMS { fn default() -> Self { let mut s = ::std::mem::MaybeUninit::::uninit(); unsafe { @@ -2105,478 +2817,7027 @@ impl Default for ck_aes_cbc_encrypt_data_params { } } } -pub type CK_RV = ::std::os::raw::c_ulong; -pub type CK_NOTIFY = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - event: CK_NOTIFICATION, - application: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_Initialize = - ::std::option::Option CK_RV>; -pub type CK_C_Finalize = - ::std::option::Option CK_RV>; -pub type CK_C_GetInfo = ::std::option::Option CK_RV>; -pub type CK_C_GetFunctionList = ::std::option::Option< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, ->; -pub type CK_C_GetSlotList = ::std::option::Option< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetSlotInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, ->; -pub type CK_C_GetTokenInfo = ::std::option::Option< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, ->; -pub type CK_C_WaitForSlotEvent = ::std::option::Option< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismList = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetMechanismInfo = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, - ) -> CK_RV, ->; -pub type CK_C_InitToken = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, - ) -> CK_RV, ->; -pub type CK_C_InitPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetPIN = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_OpenSession = ::std::option::Option< - unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CloseSession = - ::std::option::Option CK_RV>; -pub type CK_C_CloseAllSessions = - ::std::option::Option CK_RV>; -pub type CK_C_GetSessionInfo = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, ->; -pub type CK_C_GetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetOperationState = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_Login = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_Logout = - ::std::option::Option CK_RV>; -pub type CK_C_CreateObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_CopyObject = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, - ) -> CK_RV, ->; -pub type CK_C_DestroyObject = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, ->; -pub type CK_C_GetObjectSize = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_GetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_SetAttributeValue = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsInit = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjects = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, ->; -pub type CK_C_FindObjectsFinal = - ::std::option::Option CK_RV>; -pub type CK_C_EncryptInit = ::std::option::Option< +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_CMS_SIG_PARAMS { + pub certificateHandle: CK_OBJECT_HANDLE, + pub pSigningMechanism: *mut CK_MECHANISM, + pub pDigestMechanism: *mut CK_MECHANISM, + pub pContentType: *mut CK_UTF8CHAR, + pub pRequestedAttributes: *mut CK_BYTE, + pub ulRequestedAttributesLen: CK_ULONG, + pub pRequiredAttributes: *mut CK_BYTE, + pub ulRequiredAttributesLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_CMS_SIG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_CMS_SIG_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).certificateHandle) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(certificateHandle) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSigningMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pSigningMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDigestMechanism) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pDigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContentType) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pContentType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequestedAttributes) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequestedAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequestedAttributesLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequestedAttributesLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRequiredAttributes) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(pRequiredAttributes) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRequiredAttributesLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_CMS_SIG_PARAMS), + "::", + stringify!(ulRequiredAttributesLen) + ) + ); +} +impl Default for CK_CMS_SIG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 8usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DES_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DES_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_DES_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_DSA_PARAMETER_GEN_PARAM { + pub hash: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub ulIndex: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_DSA_PARAMETER_GEN_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_DSA_PARAMETER_GEN_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(hash) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIndex) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_DSA_PARAMETER_GEN_PARAM), + "::", + stringify!(ulIndex) + ) + ); +} +impl Default for CK_DSA_PARAMETER_GEN_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pSharedData) + ) + ); +} +impl Default for CK_ECDH_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH1_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_ECDH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECDH2_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_ECDH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECDH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECDH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_ECDH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_ECMQV_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub ulSharedDataLen: CK_ULONG, + pub pSharedData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_ECMQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_ECMQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSharedDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulSharedDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSharedData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pSharedData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_ECMQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_ECMQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_EDDSA_PARAMS { + pub phFlag: CK_BBOOL, + pub ulContextDataLen: CK_ULONG, + pub pContextData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_EDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_EDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).phFlag) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(phFlag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(ulContextDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_EDDSA_PARAMS), + "::", + stringify!(pContextData) + ) + ); +} +impl Default for CK_EDDSA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_MESSAGE_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvFixedBits: CK_ULONG, + pub ivGenerator: CK_GENERATOR_FUNCTION, + pub pTag: *mut CK_BYTE, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_MESSAGE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_MESSAGE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvFixedBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulIvFixedBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ivGenerator) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ivGenerator) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(pTag) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_MESSAGE_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_MESSAGE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GCM_PARAMS { + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, + pub ulIvBits: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, + pub ulTagBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GCM_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GCM_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulIvBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulTagBits) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_GCM_PARAMS), + "::", + stringify!(ulTagBits) + ) + ); +} +impl Default for CK_GCM_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_DERIVE_PARAMS { + pub kdf: CK_EC_KDF_TYPE, + pub pPublicData: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_DERIVE_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); +} +impl Default for CK_GOSTR3410_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_GOSTR3410_KEY_WRAP_PARAMS { + pub pWrapOID: *mut CK_BYTE, + pub ulWrapOIDLen: CK_ULONG, + pub pUKM: *mut CK_BYTE, + pub ulUKMLen: CK_ULONG, + pub hKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_GOSTR3410_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pWrapOID) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pWrapOID) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWrapOIDLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulWrapOIDLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pUKM) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(pUKM) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulUKMLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(ulUKMLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_GOSTR3410_KEY_WRAP_PARAMS), + "::", + stringify!(hKey) + ) + ); +} +impl Default for CK_GOSTR3410_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_HKDF_PARAMS { + pub bExtract: CK_BBOOL, + pub bExpand: CK_BBOOL, + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulSaltType: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub hSaltKey: CK_OBJECT_HANDLE, + pub pInfo: *mut CK_BYTE, + pub ulInfoLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_HKDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_HKDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExtract) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExtract) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bExpand) as usize - ptr as usize }, + 1usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(bExpand) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltType) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hSaltKey) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(hSaltKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(pInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulInfoLen) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_HKDF_PARAMS), + "::", + stringify!(ulInfoLen) + ) + ); +} +impl Default for CK_HKDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEA_DERIVE_PARAMS { + pub isSender: CK_BBOOL, + pub ulRandomLen: CK_ULONG, + pub RandomA: *mut CK_BYTE, + pub RandomB: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_KEA_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEA_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).isSender) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(isSender) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomA) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomB) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(RandomB) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_KEA_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); +} +impl Default for CK_KEA_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_DERIVATION_STRING_DATA { + pub pData: *mut CK_BYTE, + pub ulLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_DERIVATION_STRING_DATA() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_DERIVATION_STRING_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_DERIVATION_STRING_DATA), + "::", + stringify!(ulLen) + ) + ); +} +impl Default for CK_KEY_DERIVATION_STRING_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KEY_WRAP_SET_OAEP_PARAMS { + pub bBC: CK_BYTE, + pub pX: *mut CK_BYTE, + pub ulXLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KEY_WRAP_SET_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bBC) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(bBC) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(pX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulXLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KEY_WRAP_SET_OAEP_PARAMS), + "::", + stringify!(ulXLen) + ) + ); +} +impl Default for CK_KEY_WRAP_SET_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_KIP_PARAMS { + pub pMechanism: *mut CK_MECHANISM, + pub hKey: CK_OBJECT_HANDLE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_KIP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_KIP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_KIP_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); +} +impl Default for CK_KIP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAM { + pub type_: CK_OTP_PARAM_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_OTP_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_PARAMS { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_PARAMS), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_OTP_SIGNATURE_INFO { + pub pParams: *mut CK_OTP_PARAM, + pub ulCount: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_OTP_SIGNATURE_INFO() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_OTP_SIGNATURE_INFO)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pParams) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(pParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulCount) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_OTP_SIGNATURE_INFO), + "::", + stringify!(ulCount) + ) + ); +} +impl Default for CK_OTP_SIGNATURE_INFO { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PBE_PARAMS { + pub pInitVector: *mut CK_BYTE, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, + pub pSalt: *mut CK_BYTE, + pub ulSaltLen: CK_ULONG, + pub ulIteration: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PBE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PBE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitVector) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pInitVector) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSalt) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(pSalt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulSaltLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIteration) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PBE_PARAMS), + "::", + stringify!(ulIteration) + ) + ); +} +impl Default for CK_PBE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PKCS5_PBKD2_PARAMS2 { + pub saltSource: CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE, + pub pSaltSourceData: *mut ::std::os::raw::c_void, + pub ulSaltSourceDataLen: CK_ULONG, + pub iterations: CK_ULONG, + pub prf: CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE, + pub pPrfData: *mut ::std::os::raw::c_void, + pub ulPrfDataLen: CK_ULONG, + pub pPassword: *mut CK_UTF8CHAR, + pub ulPasswordLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PKCS5_PBKD2_PARAMS2() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PKCS5_PBKD2_PARAMS2)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).saltSource) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(saltSource) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSaltSourceData) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pSaltSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSaltSourceDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulSaltSourceDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iterations) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(iterations) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prf) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(prf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrfData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPrfData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrfDataLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPrfDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_PKCS5_PBKD2_PARAMS2), + "::", + stringify!(ulPasswordLen) + ) + ); +} +impl Default for CK_PKCS5_PBKD2_PARAMS2 { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_PRF_DATA_PARAM { + pub type_: CK_PRF_DATA_TYPE, + pub pValue: *mut ::std::os::raw::c_void, + pub ulValueLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_PRF_DATA_PARAM() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_PRF_DATA_PARAM)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).type_) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(type_) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pValue) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(pValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulValueLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_PRF_DATA_PARAM), + "::", + stringify!(ulValueLen) + ) + ); +} +impl Default for CK_PRF_DATA_PARAM { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_CBC_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub iv: [CK_BYTE; 8usize], +} +#[test] +fn bindgen_test_layout_CK_RC2_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_CBC_PARAMS), + "::", + stringify!(iv) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC2_MAC_GENERAL_PARAMS { + pub ulEffectiveBits: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC2_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC2_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulEffectiveBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulEffectiveBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC2_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RC5_CBC_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub pIv: *mut CK_BYTE, + pub ulIvLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_CBC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_CBC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIv) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(pIv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIvLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_CBC_PARAMS), + "::", + stringify!(ulIvLen) + ) + ); +} +impl Default for CK_RC5_CBC_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_MAC_GENERAL_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, + pub ulMacLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_MAC_GENERAL_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_MAC_GENERAL_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulRounds) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_MAC_GENERAL_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RC5_PARAMS { + pub ulWordsize: CK_ULONG, + pub ulRounds: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RC5_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RC5_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWordsize) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulWordsize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRounds) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RC5_PARAMS), + "::", + stringify!(ulRounds) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_AES_KEY_WRAP_PARAMS { + pub ulAESKeyBits: CK_ULONG, + pub pOAEPParams: *mut CK_RSA_PKCS_OAEP_PARAMS, +} +#[test] +fn bindgen_test_layout_CK_RSA_AES_KEY_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_AES_KEY_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAESKeyBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(ulAESKeyBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOAEPParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_AES_KEY_WRAP_PARAMS), + "::", + stringify!(pOAEPParams) + ) + ); +} +impl Default for CK_RSA_AES_KEY_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_RSA_PKCS_OAEP_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub source: CK_RSA_PKCS_OAEP_SOURCE_TYPE, + pub pSourceData: *mut ::std::os::raw::c_void, + pub ulSourceDataLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_OAEP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_OAEP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).source) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(source) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSourceData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(pSourceData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSourceDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_OAEP_PARAMS), + "::", + stringify!(ulSourceDataLen) + ) + ); +} +impl Default for CK_RSA_PKCS_OAEP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_RSA_PKCS_PSS_PARAMS { + pub hashAlg: CK_MECHANISM_TYPE, + pub mgf: CK_RSA_PKCS_MGF_TYPE, + pub sLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_RSA_PKCS_PSS_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_RSA_PKCS_PSS_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hashAlg) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(hashAlg) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).mgf) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(mgf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_RSA_PKCS_PSS_PARAMS), + "::", + stringify!(sLen) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pTag: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!( + "Size of: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pTag) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS), + "::", + stringify!(pTag) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + pub pNonce: *mut CK_BYTE, + pub ulNonceLen: CK_ULONG, + pub pAAD: *mut CK_BYTE, + pub ulAADLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_CHACHA20_POLY1305_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulNonceLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAAD) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(pAAD) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAADLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_CHACHA20_POLY1305_PARAMS), + "::", + stringify!(ulAADLen) + ) + ); +} +impl Default for CK_SALSA20_CHACHA20_POLY1305_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SALSA20_PARAMS { + pub pBlockCounter: *mut CK_BYTE, + pub pNonce: *mut CK_BYTE, + pub ulNonceBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SALSA20_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SALSA20_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBlockCounter) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pBlockCounter) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNonce) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(pNonce) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNonceBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SALSA20_PARAMS), + "::", + stringify!(ulNonceBits) + ) + ); +} +impl Default for CK_SALSA20_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + pub iv: [CK_BYTE; 16usize], + pub pData: *mut CK_BYTE, + pub length: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SEED_CBC_ENCRYPT_DATA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).iv) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(iv) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pData) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(pData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).length) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SEED_CBC_ENCRYPT_DATA_PARAMS), + "::", + stringify!(length) + ) + ); +} +impl Default for CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + pub ulPasswordLen: CK_ULONG, + pub pPassword: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPAndGLen: CK_ULONG, + pub ulQLen: CK_ULONG, + pub ulRandomLen: CK_ULONG, + pub pRandomA: *mut CK_BYTE, + pub pPrimeP: *mut CK_BYTE, + pub pBaseG: *mut CK_BYTE, + pub pSubprimeQ: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_PRIVATE_WRAP_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPasswordLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPassword) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPAndGLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulPAndGLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulQLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulQLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(ulRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrimeP) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pPrimeP) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pBaseG) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pBaseG) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSubprimeQ) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_PRIVATE_WRAP_PARAMS), + "::", + stringify!(pSubprimeQ) + ) + ); +} +impl Default for CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SKIPJACK_RELAYX_PARAMS { + pub ulOldWrappedXLen: CK_ULONG, + pub pOldWrappedX: *mut CK_BYTE, + pub ulOldPasswordLen: CK_ULONG, + pub pOldPassword: *mut CK_BYTE, + pub ulOldPublicDataLen: CK_ULONG, + pub pOldPublicData: *mut CK_BYTE, + pub ulOldRandomLen: CK_ULONG, + pub pOldRandomA: *mut CK_BYTE, + pub ulNewPasswordLen: CK_ULONG, + pub pNewPassword: *mut CK_BYTE, + pub ulNewPublicDataLen: CK_ULONG, + pub pNewPublicData: *mut CK_BYTE, + pub ulNewRandomLen: CK_ULONG, + pub pNewRandomA: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SKIPJACK_RELAYX_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 112usize, + concat!("Size of: ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SKIPJACK_RELAYX_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldWrappedXLen) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldWrappedXLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldWrappedX) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldWrappedX) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPasswordLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPassword) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldPublicDataLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldPublicData) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOldRandomLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulOldRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOldRandomA) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pOldRandomA) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPasswordLen) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPasswordLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPassword) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPassword) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewPublicDataLen) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewPublicData) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNewRandomLen) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(ulNewRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pNewRandomA) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_SKIPJACK_RELAYX_PARAMS), + "::", + stringify!(pNewRandomA) + ) + ); +} +impl Default for CK_SKIPJACK_RELAYX_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_COUNTER_FORMAT { + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_COUNTER_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 16usize, + concat!("Size of: ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_COUNTER_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_COUNTER_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_SP800_108_DKM_LENGTH_FORMAT { + pub dkmLengthMethod: CK_SP800_108_DKM_LENGTH_METHOD, + pub bLittleEndian: CK_BBOOL, + pub ulWidthInBits: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_DKM_LENGTH_FORMAT() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_DKM_LENGTH_FORMAT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).dkmLengthMethod) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(dkmLengthMethod) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bLittleEndian) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(bLittleEndian) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulWidthInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_DKM_LENGTH_FORMAT), + "::", + stringify!(ulWidthInBits) + ) + ); +} +pub type CK_SP800_108_PRF_TYPE = CK_MECHANISM_TYPE; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_FEEDBACK_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulIVLen: CK_ULONG, + pub pIV: *mut CK_BYTE, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_FEEDBACK_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulIVLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pIV) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_FEEDBACK_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_FEEDBACK_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SP800_108_KDF_PARAMS { + pub prfType: CK_SP800_108_PRF_TYPE, + pub ulNumberOfDataParams: CK_ULONG, + pub pDataParams: *mut CK_PRF_DATA_PARAM, + pub ulAdditionalDerivedKeys: CK_ULONG, + pub pAdditionalDerivedKeys: *mut CK_DERIVED_KEY, +} +#[test] +fn bindgen_test_layout_CK_SP800_108_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SP800_108_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfType) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(prfType) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulNumberOfDataParams) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulNumberOfDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pDataParams) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pDataParams) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulAdditionalDerivedKeys) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(ulAdditionalDerivedKeys) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pAdditionalDerivedKeys) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SP800_108_KDF_PARAMS), + "::", + stringify!(pAdditionalDerivedKeys) + ) + ); +} +impl Default for CK_SP800_108_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_INITIALIZE_PARAMS { + pub sk: *mut CK_BYTE, + pub peer_public_prekey: CK_OBJECT_HANDLE, + pub peer_public_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_INITIALIZE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_INITIALIZE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).peer_public_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(peer_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_INITIALIZE_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_INITIALIZE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X2RATCHET_RESPOND_PARAMS { + pub sk: *mut CK_BYTE, + pub own_prekey: CK_OBJECT_HANDLE, + pub initiator_identity: CK_OBJECT_HANDLE, + pub own_public_identity: CK_OBJECT_HANDLE, + pub bEncryptedHeader: CK_BBOOL, + pub eCurve: CK_ULONG, + pub aeadMechanism: CK_MECHANISM_TYPE, + pub kdfMechanism: CK_X2RATCHET_KDF_TYPE, +} +#[test] +fn bindgen_test_layout_CK_X2RATCHET_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 64usize, + concat!("Size of: ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X2RATCHET_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).sk) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(sk) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_prekey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).initiator_identity) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(initiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).own_public_identity) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(own_public_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bEncryptedHeader) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(bEncryptedHeader) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).eCurve) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(eCurve) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).aeadMechanism) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(aeadMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdfMechanism) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X2RATCHET_RESPOND_PARAMS), + "::", + stringify!(kdfMechanism) + ) + ); +} +impl Default for CK_X2RATCHET_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_INITIATE_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pPeer_identity: CK_OBJECT_HANDLE, + pub pPeer_prekey: CK_OBJECT_HANDLE, + pub pPrekey_signature: *mut CK_BYTE, + pub pOnetime_key: *mut CK_BYTE, + pub pOwn_identity: CK_OBJECT_HANDLE, + pub pOwn_ephemeral: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_INITIATE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_INITIATE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_identity) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPeer_prekey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPeer_prekey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_signature) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pPrekey_signature) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_key) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOnetime_key) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_identity) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOwn_ephemeral) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_INITIATE_PARAMS), + "::", + stringify!(pOwn_ephemeral) + ) + ); +} +impl Default for CK_X3DH_INITIATE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X3DH_RESPOND_PARAMS { + pub kdf: CK_X3DH_KDF_TYPE, + pub pIdentity_id: *mut CK_BYTE, + pub pPrekey_id: *mut CK_BYTE, + pub pOnetime_id: *mut CK_BYTE, + pub pInitiator_identity: CK_OBJECT_HANDLE, + pub pInitiator_ephemeral: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X3DH_RESPOND_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X3DH_RESPOND_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIdentity_id) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pIdentity_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPrekey_id) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pPrekey_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOnetime_id) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pOnetime_id) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_identity) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_identity) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pInitiator_ephemeral) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X3DH_RESPOND_PARAMS), + "::", + stringify!(pInitiator_ephemeral) + ) + ); +} +impl Default for CK_X3DH_RESPOND_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH1_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH1_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH1_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH1_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); +} +impl Default for CK_X9_42_DH1_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_DH2_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub pOtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub pPublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub pPublicData2: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_DH2_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_DH2_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pOtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pPublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_DH2_DERIVE_PARAMS), + "::", + stringify!(pPublicData2) + ) + ); +} +impl Default for CK_X9_42_DH2_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_X9_42_MQV_DERIVE_PARAMS { + pub kdf: CK_X9_42_DH_KDF_TYPE, + pub ulOtherInfoLen: CK_ULONG, + pub OtherInfo: *mut CK_BYTE, + pub ulPublicDataLen: CK_ULONG, + pub PublicData: *mut CK_BYTE, + pub ulPrivateDataLen: CK_ULONG, + pub hPrivateData: CK_OBJECT_HANDLE, + pub ulPublicDataLen2: CK_ULONG, + pub PublicData2: *mut CK_BYTE, + pub publicKey: CK_OBJECT_HANDLE, +} +#[test] +fn bindgen_test_layout_CK_X9_42_MQV_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_X9_42_MQV_DERIVE_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).kdf) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(kdf) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulOtherInfoLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulOtherInfoLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).OtherInfo) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(OtherInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPrivateDataLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPrivateDataLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hPrivateData) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(hPrivateData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulPublicDataLen2) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(ulPublicDataLen2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).PublicData2) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(PublicData2) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).publicKey) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_X9_42_MQV_DERIVE_PARAMS), + "::", + stringify!(publicKey) + ) + ); +} +impl Default for CK_X9_42_MQV_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_XEDDSA_PARAMS { + pub hash: CK_XEDDSA_HASH_TYPE, +} +#[test] +fn bindgen_test_layout_CK_XEDDSA_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 8usize, + concat!("Size of: ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_XEDDSA_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hash) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_XEDDSA_PARAMS), + "::", + stringify!(hash) + ) + ); +} +pub type CK_SSL3_KEY_MAT_OUT_PTR = *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_OUT; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR = *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_SSL3_KEY_MAT_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_SSL3_MASTER_KEY_DERIVE_PARAMS; +pub type CK_SSL3_RANDOM_DATA_PTR = *mut CK_SSL3_RANDOM_DATA; +pub type CK_SSL3_RANDOM_DATA_PTR_PTR = *mut *mut CK_SSL3_RANDOM_DATA; +pub type CK_TLS_KDF_PARAMS_PTR = *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_KDF_PARAMS_PTR_PTR = *mut *mut CK_TLS_KDF_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR = *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_MAC_PARAMS_PTR_PTR = *mut *mut CK_TLS_MAC_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR = *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_TLS_PRF_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR = *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_TLS12_KEY_MAT_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_TLS12_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_TLS12_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_KEY_MAT_OUT_PTR = *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_OUT_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_OUT; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR = *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_KEY_MAT_PARAMS_PTR_PTR = *mut *mut CK_WTLS_KEY_MAT_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR = *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_MASTER_KEY_DERIVE_PARAMS_PTR_PTR = *mut *mut CK_WTLS_MASTER_KEY_DERIVE_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR = *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_PRF_PARAMS_PTR_PTR = *mut *mut CK_WTLS_PRF_PARAMS; +pub type CK_WTLS_RANDOM_DATA_PTR = *mut CK_WTLS_RANDOM_DATA; +pub type CK_WTLS_RANDOM_DATA_PTR_PTR = *mut *mut CK_WTLS_RANDOM_DATA; +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_OUT { + pub hClientMacSecret: CK_OBJECT_HANDLE, + pub hServerMacSecret: CK_OBJECT_HANDLE, + pub hClientKey: CK_OBJECT_HANDLE, + pub hServerKey: CK_OBJECT_HANDLE, + pub pIVClient: *mut CK_BYTE, + pub pIVServer: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerMacSecret) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hClientKey) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hClientKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hServerKey) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(hServerKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVClient) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVClient) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIVServer) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_OUT), + "::", + stringify!(pIVServer) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_SSL3_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_SSL3_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_SSL3_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_SSL3_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_SSL3_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, +} +#[test] +fn bindgen_test_layout_CK_SSL3_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 40usize, + concat!("Size of: ", stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_SSL3_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_KDF_PARAMS { + pub prfMechanism: CK_MECHANISM_TYPE, + pub pLabel: *mut CK_BYTE, + pub ulLabelLength: CK_ULONG, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pContextData: *mut CK_BYTE, + pub ulContextDataLength: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_KDF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 72usize, + concat!("Size of: ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_KDF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(prfMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLength) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulLabelLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pContextData) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(pContextData) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulContextDataLength) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_KDF_PARAMS), + "::", + stringify!(ulContextDataLength) + ) + ); +} +impl Default for CK_TLS_KDF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_TLS_MAC_PARAMS { + pub prfHashMechanism: CK_MECHANISM_TYPE, + pub ulMacLength: CK_ULONG, + pub ulServerOrClient: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_MAC_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_MAC_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacLength) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulMacLength) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerOrClient) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_MAC_PARAMS), + "::", + stringify!(ulServerOrClient) + ) + ); +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS_PRF_PARAMS { + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_TLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_TLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_KEY_MAT_PARAMS { + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_SSL3_KEY_MAT_OUT, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 80usize, + concat!("Size of: ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_TLS12_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_KEY_MAT_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + pub RandomInfo: CK_SSL3_RANDOM_DATA, + pub pVersion: *mut CK_VERSION, + pub prfHashMechanism: CK_MECHANISM_TYPE, +} +#[test] +fn bindgen_test_layout_CK_TLS12_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).prfHashMechanism) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_TLS12_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(prfHashMechanism) + ) + ); +} +impl Default for CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_OUT { + pub hMacSecret: CK_OBJECT_HANDLE, + pub hKey: CK_OBJECT_HANDLE, + pub pIV: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_OUT() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 24usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_OUT)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hMacSecret) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hMacSecret) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).hKey) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(hKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pIV) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_OUT), + "::", + stringify!(pIV) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_OUT { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_RANDOM_DATA { + pub pClientRandom: *mut CK_BYTE, + pub ulClientRandomLen: CK_ULONG, + pub pServerRandom: *mut CK_BYTE, + pub ulServerRandomLen: CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_RANDOM_DATA() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 32usize, + concat!("Size of: ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_RANDOM_DATA)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pClientRandom) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pClientRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulClientRandomLen) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulClientRandomLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pServerRandom) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(pServerRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulServerRandomLen) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_RANDOM_DATA), + "::", + stringify!(ulServerRandomLen) + ) + ); +} +impl Default for CK_WTLS_RANDOM_DATA { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_KEY_MAT_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub ulMacSizeInBits: CK_ULONG, + pub ulKeySizeInBits: CK_ULONG, + pub ulIVSizeInBits: CK_ULONG, + pub ulSequenceNumber: CK_ULONG, + pub bIsExport: CK_BBOOL, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pReturnedKeyMaterial: *mut CK_WTLS_KEY_MAT_OUT, +} +#[test] +fn bindgen_test_layout_CK_WTLS_KEY_MAT_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 88usize, + concat!("Size of: ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_KEY_MAT_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulMacSizeInBits) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulMacSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulKeySizeInBits) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulKeySizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulIVSizeInBits) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulIVSizeInBits) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSequenceNumber) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(ulSequenceNumber) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).bIsExport) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(bIsExport) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pReturnedKeyMaterial) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_KEY_MAT_PARAMS), + "::", + stringify!(pReturnedKeyMaterial) + ) + ); +} +impl Default for CK_WTLS_KEY_MAT_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub RandomInfo: CK_WTLS_RANDOM_DATA, + pub pVersion: *mut CK_BYTE, +} +#[test] +fn bindgen_test_layout_CK_WTLS_MASTER_KEY_DERIVE_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = + ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 48usize, + concat!("Size of: ", stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!( + "Alignment of ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).RandomInfo) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(RandomInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pVersion) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_MASTER_KEY_DERIVE_PARAMS), + "::", + stringify!(pVersion) + ) + ); +} +impl Default for CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +#[repr(C)] +#[derive(Debug, Copy, Clone)] +pub struct CK_WTLS_PRF_PARAMS { + pub DigestMechanism: CK_MECHANISM_TYPE, + pub pSeed: *mut CK_BYTE, + pub ulSeedLen: CK_ULONG, + pub pLabel: *mut CK_BYTE, + pub ulLabelLen: CK_ULONG, + pub pOutput: *mut CK_BYTE, + pub pulOutputLen: *mut CK_ULONG, +} +#[test] +fn bindgen_test_layout_CK_WTLS_PRF_PARAMS() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 56usize, + concat!("Size of: ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_WTLS_PRF_PARAMS)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).DigestMechanism) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(DigestMechanism) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pSeed) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pSeed) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulSeedLen) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulSeedLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pLabel) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pLabel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).ulLabelLen) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(ulLabelLen) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pOutput) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pOutput) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).pulOutputLen) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_WTLS_PRF_PARAMS), + "::", + stringify!(pulOutputLen) + ) + ); +} +impl Default for CK_WTLS_PRF_PARAMS { + fn default() -> Self { + let mut s = ::std::mem::MaybeUninit::::uninit(); + unsafe { + ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); + s.assume_init() + } + } +} +pub type CK_C_Initialize = + ::std::option::Option CK_RV>; +pub type CK_C_Finalize = + ::std::option::Option CK_RV>; +pub type CK_C_GetInfo = ::std::option::Option CK_RV>; +pub type CK_C_GetFunctionList = + ::std::option::Option CK_RV>; +pub type CK_C_GetSlotList = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetSlotInfo = + ::std::option::Option CK_RV>; +pub type CK_C_GetTokenInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, +>; +pub type CK_C_GetMechanismList = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetMechanismInfo = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, + ) -> CK_RV, +>; +pub type CK_C_InitToken = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + ) -> CK_RV, +>; +pub type CK_C_InitPIN = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_UTF8CHAR, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetPIN = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_OpenSession = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CloseSession = + ::std::option::Option CK_RV>; +pub type CK_C_CloseAllSessions = + ::std::option::Option CK_RV>; +pub type CK_C_GetSessionInfo = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, +>; +pub type CK_C_GetOperationState = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_SetOperationState = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_Login = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_Logout = + ::std::option::Option CK_RV>; +pub type CK_C_CreateObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_CopyObject = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DestroyObject = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, +>; +pub type CK_C_GetObjectSize = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_GetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SetAttributeValue = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsInit = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_ATTRIBUTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_FindObjects = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_FindObjectsFinal = + ::std::option::Option CK_RV>; +pub type CK_C_EncryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Encrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_EncryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DecryptInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Decrypt = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_DigestInit = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, >; pub type CK_C_Digest = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_DigestKey = ::std::option::Option< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, >; pub type CK_C_DigestFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Sign = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_SignFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: *mut CK_ULONG) -> CK_RV, >; pub type CK_C_SignRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SignRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_Verify = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, >; pub type CK_C_VerifyUpdate = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyFinal = ::std::option::Option< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, >; pub type CK_C_VerifyRecoverInit = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_VerifyRecover = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DigestEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptDigestUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_SignEncryptUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_DecryptVerifyUpdate = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_GenerateKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_GenerateKeyPair = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_WrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, >; pub type CK_C_UnwrapKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_DeriveKey = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, >; pub type CK_C_SeedRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GenerateRandom = ::std::option::Option< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetFunctionStatus = + ::std::option::Option CK_RV>; +pub type CK_C_CancelFunction = + ::std::option::Option CK_RV>; +pub type CK_C_WaitForSlotEvent = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, >; -pub type CK_C_GenerateRandom = ::std::option::Option< +pub type CK_C_GetInterfaceList = ::std::option::Option< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, +>; +pub type CK_C_GetInterface = ::std::option::Option< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, >; -pub type CK_C_GetFunctionStatus = - ::std::option::Option CK_RV>; -pub type CK_C_CancelFunction = - ::std::option::Option CK_RV>; +pub type CK_C_LoginUser = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SessionCancel = + ::std::option::Option CK_RV>; +pub type CK_C_MessageEncryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_EncryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageEncryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageDecryptInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_DecryptMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV, +>; +pub type CK_C_MessageDecryptFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageSignInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_SignMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_SignMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageSignFinal = + ::std::option::Option CK_RV>; +pub type CK_C_MessageVerifyInit = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessage = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageBegin = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_VerifyMessageNext = ::std::option::Option< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV, +>; +pub type CK_C_MessageVerifyFinal = + ::std::option::Option CK_RV>; +#[repr(C)] +#[derive(Debug, Default, Copy, Clone)] +pub struct CK_FUNCTION_LIST_3_0 { + pub version: CK_VERSION, + pub C_Initialize: CK_C_Initialize, + pub C_Finalize: CK_C_Finalize, + pub C_GetInfo: CK_C_GetInfo, + pub C_GetFunctionList: CK_C_GetFunctionList, + pub C_GetSlotList: CK_C_GetSlotList, + pub C_GetSlotInfo: CK_C_GetSlotInfo, + pub C_GetTokenInfo: CK_C_GetTokenInfo, + pub C_GetMechanismList: CK_C_GetMechanismList, + pub C_GetMechanismInfo: CK_C_GetMechanismInfo, + pub C_InitToken: CK_C_InitToken, + pub C_InitPIN: CK_C_InitPIN, + pub C_SetPIN: CK_C_SetPIN, + pub C_OpenSession: CK_C_OpenSession, + pub C_CloseSession: CK_C_CloseSession, + pub C_CloseAllSessions: CK_C_CloseAllSessions, + pub C_GetSessionInfo: CK_C_GetSessionInfo, + pub C_GetOperationState: CK_C_GetOperationState, + pub C_SetOperationState: CK_C_SetOperationState, + pub C_Login: CK_C_Login, + pub C_Logout: CK_C_Logout, + pub C_CreateObject: CK_C_CreateObject, + pub C_CopyObject: CK_C_CopyObject, + pub C_DestroyObject: CK_C_DestroyObject, + pub C_GetObjectSize: CK_C_GetObjectSize, + pub C_GetAttributeValue: CK_C_GetAttributeValue, + pub C_SetAttributeValue: CK_C_SetAttributeValue, + pub C_FindObjectsInit: CK_C_FindObjectsInit, + pub C_FindObjects: CK_C_FindObjects, + pub C_FindObjectsFinal: CK_C_FindObjectsFinal, + pub C_EncryptInit: CK_C_EncryptInit, + pub C_Encrypt: CK_C_Encrypt, + pub C_EncryptUpdate: CK_C_EncryptUpdate, + pub C_EncryptFinal: CK_C_EncryptFinal, + pub C_DecryptInit: CK_C_DecryptInit, + pub C_Decrypt: CK_C_Decrypt, + pub C_DecryptUpdate: CK_C_DecryptUpdate, + pub C_DecryptFinal: CK_C_DecryptFinal, + pub C_DigestInit: CK_C_DigestInit, + pub C_Digest: CK_C_Digest, + pub C_DigestUpdate: CK_C_DigestUpdate, + pub C_DigestKey: CK_C_DigestKey, + pub C_DigestFinal: CK_C_DigestFinal, + pub C_SignInit: CK_C_SignInit, + pub C_Sign: CK_C_Sign, + pub C_SignUpdate: CK_C_SignUpdate, + pub C_SignFinal: CK_C_SignFinal, + pub C_SignRecoverInit: CK_C_SignRecoverInit, + pub C_SignRecover: CK_C_SignRecover, + pub C_VerifyInit: CK_C_VerifyInit, + pub C_Verify: CK_C_Verify, + pub C_VerifyUpdate: CK_C_VerifyUpdate, + pub C_VerifyFinal: CK_C_VerifyFinal, + pub C_VerifyRecoverInit: CK_C_VerifyRecoverInit, + pub C_VerifyRecover: CK_C_VerifyRecover, + pub C_DigestEncryptUpdate: CK_C_DigestEncryptUpdate, + pub C_DecryptDigestUpdate: CK_C_DecryptDigestUpdate, + pub C_SignEncryptUpdate: CK_C_SignEncryptUpdate, + pub C_DecryptVerifyUpdate: CK_C_DecryptVerifyUpdate, + pub C_GenerateKey: CK_C_GenerateKey, + pub C_GenerateKeyPair: CK_C_GenerateKeyPair, + pub C_WrapKey: CK_C_WrapKey, + pub C_UnwrapKey: CK_C_UnwrapKey, + pub C_DeriveKey: CK_C_DeriveKey, + pub C_SeedRandom: CK_C_SeedRandom, + pub C_GenerateRandom: CK_C_GenerateRandom, + pub C_GetFunctionStatus: CK_C_GetFunctionStatus, + pub C_CancelFunction: CK_C_CancelFunction, + pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, + pub C_GetInterfaceList: CK_C_GetInterfaceList, + pub C_GetInterface: CK_C_GetInterface, + pub C_LoginUser: CK_C_LoginUser, + pub C_SessionCancel: CK_C_SessionCancel, + pub C_MessageEncryptInit: CK_C_MessageEncryptInit, + pub C_EncryptMessage: CK_C_EncryptMessage, + pub C_EncryptMessageBegin: CK_C_EncryptMessageBegin, + pub C_EncryptMessageNext: CK_C_EncryptMessageNext, + pub C_MessageEncryptFinal: CK_C_MessageEncryptFinal, + pub C_MessageDecryptInit: CK_C_MessageDecryptInit, + pub C_DecryptMessage: CK_C_DecryptMessage, + pub C_DecryptMessageBegin: CK_C_DecryptMessageBegin, + pub C_DecryptMessageNext: CK_C_DecryptMessageNext, + pub C_MessageDecryptFinal: CK_C_MessageDecryptFinal, + pub C_MessageSignInit: CK_C_MessageSignInit, + pub C_SignMessage: CK_C_SignMessage, + pub C_SignMessageBegin: CK_C_SignMessageBegin, + pub C_SignMessageNext: CK_C_SignMessageNext, + pub C_MessageSignFinal: CK_C_MessageSignFinal, + pub C_MessageVerifyInit: CK_C_MessageVerifyInit, + pub C_VerifyMessage: CK_C_VerifyMessage, + pub C_VerifyMessageBegin: CK_C_VerifyMessageBegin, + pub C_VerifyMessageNext: CK_C_VerifyMessageNext, + pub C_MessageVerifyFinal: CK_C_MessageVerifyFinal, +} +#[test] +fn bindgen_test_layout_CK_FUNCTION_LIST_3_0() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); + let ptr = UNINIT.as_ptr(); + assert_eq!( + ::std::mem::size_of::(), + 744usize, + concat!("Size of: ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + ::std::mem::align_of::(), + 8usize, + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST_3_0)) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, + 0usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(version) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Initialize) as usize - ptr as usize }, + 8usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Initialize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Finalize) as usize - ptr as usize }, + 16usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Finalize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInfo) as usize - ptr as usize }, + 24usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionList) as usize - ptr as usize }, + 32usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotList) as usize - ptr as usize }, + 40usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSlotInfo) as usize - ptr as usize }, + 48usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSlotInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetTokenInfo) as usize - ptr as usize }, + 56usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetTokenInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismList) as usize - ptr as usize }, + 64usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetMechanismInfo) as usize - ptr as usize }, + 72usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetMechanismInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitToken) as usize - ptr as usize }, + 80usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitToken) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_InitPIN) as usize - ptr as usize }, + 88usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_InitPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetPIN) as usize - ptr as usize }, + 96usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetPIN) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_OpenSession) as usize - ptr as usize }, + 104usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_OpenSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseSession) as usize - ptr as usize }, + 112usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseSession) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CloseAllSessions) as usize - ptr as usize }, + 120usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CloseAllSessions) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetSessionInfo) as usize - ptr as usize }, + 128usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetSessionInfo) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetOperationState) as usize - ptr as usize }, + 136usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetOperationState) as usize - ptr as usize }, + 144usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetOperationState) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Login) as usize - ptr as usize }, + 152usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Login) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Logout) as usize - ptr as usize }, + 160usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Logout) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CreateObject) as usize - ptr as usize }, + 168usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CreateObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CopyObject) as usize - ptr as usize }, + 176usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CopyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DestroyObject) as usize - ptr as usize }, + 184usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DestroyObject) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetObjectSize) as usize - ptr as usize }, + 192usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetObjectSize) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetAttributeValue) as usize - ptr as usize }, + 200usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SetAttributeValue) as usize - ptr as usize }, + 208usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SetAttributeValue) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsInit) as usize - ptr as usize }, + 216usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjects) as usize - ptr as usize }, + 224usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjects) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_FindObjectsFinal) as usize - ptr as usize }, + 232usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_FindObjectsFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptInit) as usize - ptr as usize }, + 240usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Encrypt) as usize - ptr as usize }, + 248usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Encrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptUpdate) as usize - ptr as usize }, + 256usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptFinal) as usize - ptr as usize }, + 264usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptInit) as usize - ptr as usize }, + 272usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Decrypt) as usize - ptr as usize }, + 280usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Decrypt) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptUpdate) as usize - ptr as usize }, + 288usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptFinal) as usize - ptr as usize }, + 296usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestInit) as usize - ptr as usize }, + 304usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Digest) as usize - ptr as usize }, + 312usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Digest) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestUpdate) as usize - ptr as usize }, + 320usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestKey) as usize - ptr as usize }, + 328usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestFinal) as usize - ptr as usize }, + 336usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignInit) as usize - ptr as usize }, + 344usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Sign) as usize - ptr as usize }, + 352usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Sign) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignUpdate) as usize - ptr as usize }, + 360usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignFinal) as usize - ptr as usize }, + 368usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecoverInit) as usize - ptr as usize }, + 376usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignRecover) as usize - ptr as usize }, + 384usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyInit) as usize - ptr as usize }, + 392usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_Verify) as usize - ptr as usize }, + 400usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_Verify) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyUpdate) as usize - ptr as usize }, + 408usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyFinal) as usize - ptr as usize }, + 416usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecoverInit) as usize - ptr as usize }, + 424usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecoverInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyRecover) as usize - ptr as usize }, + 432usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyRecover) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DigestEncryptUpdate) as usize - ptr as usize }, + 440usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DigestEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptDigestUpdate) as usize - ptr as usize }, + 448usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptDigestUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignEncryptUpdate) as usize - ptr as usize }, + 456usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignEncryptUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptVerifyUpdate) as usize - ptr as usize }, + 464usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptVerifyUpdate) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKey) as usize - ptr as usize }, + 472usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateKeyPair) as usize - ptr as usize }, + 480usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateKeyPair) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WrapKey) as usize - ptr as usize }, + 488usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_UnwrapKey) as usize - ptr as usize }, + 496usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_UnwrapKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DeriveKey) as usize - ptr as usize }, + 504usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DeriveKey) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SeedRandom) as usize - ptr as usize }, + 512usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SeedRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GenerateRandom) as usize - ptr as usize }, + 520usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GenerateRandom) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetFunctionStatus) as usize - ptr as usize }, + 528usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetFunctionStatus) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_CancelFunction) as usize - ptr as usize }, + 536usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_CancelFunction) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_WaitForSlotEvent) as usize - ptr as usize }, + 544usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_WaitForSlotEvent) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterfaceList) as usize - ptr as usize }, + 552usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterfaceList) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_GetInterface) as usize - ptr as usize }, + 560usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_GetInterface) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_LoginUser) as usize - ptr as usize }, + 568usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_LoginUser) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SessionCancel) as usize - ptr as usize }, + 576usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SessionCancel) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptInit) as usize - ptr as usize }, + 584usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessage) as usize - ptr as usize }, + 592usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageBegin) as usize - ptr as usize }, + 600usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_EncryptMessageNext) as usize - ptr as usize }, + 608usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_EncryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageEncryptFinal) as usize - ptr as usize }, + 616usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageEncryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptInit) as usize - ptr as usize }, + 624usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessage) as usize - ptr as usize }, + 632usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageBegin) as usize - ptr as usize }, + 640usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_DecryptMessageNext) as usize - ptr as usize }, + 648usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_DecryptMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageDecryptFinal) as usize - ptr as usize }, + 656usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageDecryptFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignInit) as usize - ptr as usize }, + 664usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessage) as usize - ptr as usize }, + 672usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageBegin) as usize - ptr as usize }, + 680usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_SignMessageNext) as usize - ptr as usize }, + 688usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_SignMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageSignFinal) as usize - ptr as usize }, + 696usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageSignFinal) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyInit) as usize - ptr as usize }, + 704usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyInit) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessage) as usize - ptr as usize }, + 712usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessage) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageBegin) as usize - ptr as usize }, + 720usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageBegin) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_VerifyMessageNext) as usize - ptr as usize }, + 728usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_VerifyMessageNext) + ) + ); + assert_eq!( + unsafe { ::std::ptr::addr_of!((*ptr).C_MessageVerifyFinal) as usize - ptr as usize }, + 736usize, + concat!( + "Offset of field: ", + stringify!(CK_FUNCTION_LIST_3_0), + "::", + stringify!(C_MessageVerifyFinal) + ) + ); +} #[repr(C)] #[derive(Debug, Default, Copy, Clone)] -pub struct _CK_FUNCTION_LIST { - pub version: _CK_VERSION, +pub struct CK_FUNCTION_LIST { + pub version: CK_VERSION, pub C_Initialize: CK_C_Initialize, pub C_Finalize: CK_C_Finalize, pub C_GetInfo: CK_C_GetInfo, @@ -2647,25 +9908,25 @@ pub struct _CK_FUNCTION_LIST { pub C_WaitForSlotEvent: CK_C_WaitForSlotEvent, } #[test] -fn bindgen_test_layout__CK_FUNCTION_LIST() { - const UNINIT: ::std::mem::MaybeUninit<_CK_FUNCTION_LIST> = ::std::mem::MaybeUninit::uninit(); +fn bindgen_test_layout_CK_FUNCTION_LIST() { + const UNINIT: ::std::mem::MaybeUninit = ::std::mem::MaybeUninit::uninit(); let ptr = UNINIT.as_ptr(); assert_eq!( - ::std::mem::size_of::<_CK_FUNCTION_LIST>(), + ::std::mem::size_of::(), 552usize, - concat!("Size of: ", stringify!(_CK_FUNCTION_LIST)) + concat!("Size of: ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( - ::std::mem::align_of::<_CK_FUNCTION_LIST>(), + ::std::mem::align_of::(), 8usize, - concat!("Alignment of ", stringify!(_CK_FUNCTION_LIST)) + concat!("Alignment of ", stringify!(CK_FUNCTION_LIST)) ); assert_eq!( unsafe { ::std::ptr::addr_of!((*ptr).version) as usize - ptr as usize }, 0usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(version) ) @@ -2675,7 +9936,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 8usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Initialize) ) @@ -2685,7 +9946,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 16usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Finalize) ) @@ -2695,7 +9956,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 24usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetInfo) ) @@ -2705,7 +9966,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 32usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionList) ) @@ -2715,7 +9976,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 40usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotList) ) @@ -2725,7 +9986,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 48usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSlotInfo) ) @@ -2735,7 +9996,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 56usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetTokenInfo) ) @@ -2745,7 +10006,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 64usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismList) ) @@ -2755,7 +10016,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 72usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetMechanismInfo) ) @@ -2765,7 +10026,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 80usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitToken) ) @@ -2775,7 +10036,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 88usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_InitPIN) ) @@ -2785,7 +10046,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 96usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetPIN) ) @@ -2795,7 +10056,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 104usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_OpenSession) ) @@ -2805,7 +10066,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 112usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseSession) ) @@ -2815,7 +10076,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 120usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CloseAllSessions) ) @@ -2825,7 +10086,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 128usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetSessionInfo) ) @@ -2835,7 +10096,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 136usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetOperationState) ) @@ -2845,7 +10106,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 144usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetOperationState) ) @@ -2855,7 +10116,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 152usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Login) ) @@ -2865,7 +10126,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 160usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Logout) ) @@ -2875,7 +10136,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 168usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CreateObject) ) @@ -2885,7 +10146,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 176usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CopyObject) ) @@ -2895,7 +10156,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 184usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DestroyObject) ) @@ -2905,7 +10166,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 192usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetObjectSize) ) @@ -2915,7 +10176,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 200usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetAttributeValue) ) @@ -2925,7 +10186,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 208usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SetAttributeValue) ) @@ -2935,7 +10196,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 216usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsInit) ) @@ -2945,7 +10206,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 224usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjects) ) @@ -2955,7 +10216,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 232usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_FindObjectsFinal) ) @@ -2965,7 +10226,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 240usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptInit) ) @@ -2975,7 +10236,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 248usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Encrypt) ) @@ -2985,7 +10246,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 256usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptUpdate) ) @@ -2995,7 +10256,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 264usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_EncryptFinal) ) @@ -3005,7 +10266,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 272usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptInit) ) @@ -3015,7 +10276,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 280usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Decrypt) ) @@ -3025,7 +10286,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 288usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptUpdate) ) @@ -3035,7 +10296,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 296usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptFinal) ) @@ -3045,7 +10306,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 304usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestInit) ) @@ -3055,7 +10316,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 312usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Digest) ) @@ -3065,7 +10326,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 320usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestUpdate) ) @@ -3075,7 +10336,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 328usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestKey) ) @@ -3085,7 +10346,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 336usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestFinal) ) @@ -3095,7 +10356,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 344usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignInit) ) @@ -3105,7 +10366,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 352usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Sign) ) @@ -3115,7 +10376,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 360usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignUpdate) ) @@ -3125,7 +10386,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 368usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignFinal) ) @@ -3135,7 +10396,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 376usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecoverInit) ) @@ -3145,7 +10406,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 384usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignRecover) ) @@ -3155,7 +10416,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 392usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyInit) ) @@ -3165,7 +10426,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 400usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_Verify) ) @@ -3175,7 +10436,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 408usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyUpdate) ) @@ -3185,7 +10446,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 416usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyFinal) ) @@ -3195,7 +10456,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 424usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecoverInit) ) @@ -3205,7 +10466,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 432usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_VerifyRecover) ) @@ -3215,7 +10476,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 440usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DigestEncryptUpdate) ) @@ -3225,7 +10486,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 448usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptDigestUpdate) ) @@ -3235,7 +10496,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 456usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SignEncryptUpdate) ) @@ -3245,7 +10506,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 464usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DecryptVerifyUpdate) ) @@ -3255,7 +10516,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 472usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKey) ) @@ -3265,7 +10526,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 480usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateKeyPair) ) @@ -3275,7 +10536,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 488usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WrapKey) ) @@ -3285,7 +10546,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 496usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_UnwrapKey) ) @@ -3295,7 +10556,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 504usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_DeriveKey) ) @@ -3305,7 +10566,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 512usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_SeedRandom) ) @@ -3315,7 +10576,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 520usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GenerateRandom) ) @@ -3325,7 +10586,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 528usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_GetFunctionStatus) ) @@ -3335,7 +10596,7 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 536usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_CancelFunction) ) @@ -3345,704 +10606,716 @@ fn bindgen_test_layout__CK_FUNCTION_LIST() { 544usize, concat!( "Offset of field: ", - stringify!(_CK_FUNCTION_LIST), + stringify!(CK_FUNCTION_LIST), "::", stringify!(C_WaitForSlotEvent) ) ); } -pub type CK_CREATEMUTEX = - ::std::option::Option CK_RV>; -pub type CK_DESTROYMUTEX = - ::std::option::Option CK_RV>; -pub type CK_LOCKMUTEX = - ::std::option::Option CK_RV>; -pub type CK_UNLOCKMUTEX = - ::std::option::Option CK_RV>; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct _CK_C_INITIALIZE_ARGS { - pub CreateMutex: CK_CREATEMUTEX, - pub DestroyMutex: CK_DESTROYMUTEX, - pub LockMutex: CK_LOCKMUTEX, - pub UnlockMutex: CK_UNLOCKMUTEX, - pub flags: CK_FLAGS, - pub pReserved: *mut ::std::os::raw::c_void, -} -#[test] -fn bindgen_test_layout__CK_C_INITIALIZE_ARGS() { - const UNINIT: ::std::mem::MaybeUninit<_CK_C_INITIALIZE_ARGS> = - ::std::mem::MaybeUninit::uninit(); - let ptr = UNINIT.as_ptr(); - assert_eq!( - ::std::mem::size_of::<_CK_C_INITIALIZE_ARGS>(), - 48usize, - concat!("Size of: ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - ::std::mem::align_of::<_CK_C_INITIALIZE_ARGS>(), - 8usize, - concat!("Alignment of ", stringify!(_CK_C_INITIALIZE_ARGS)) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).CreateMutex) as usize - ptr as usize }, - 0usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(CreateMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).DestroyMutex) as usize - ptr as usize }, - 8usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(DestroyMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).LockMutex) as usize - ptr as usize }, - 16usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(LockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).UnlockMutex) as usize - ptr as usize }, - 24usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(UnlockMutex) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).flags) as usize - ptr as usize }, - 32usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(flags) - ) - ); - assert_eq!( - unsafe { ::std::ptr::addr_of!((*ptr).pReserved) as usize - ptr as usize }, - 40usize, - concat!( - "Offset of field: ", - stringify!(_CK_C_INITIALIZE_ARGS), - "::", - stringify!(pReserved) - ) - ); -} -impl Default for _CK_C_INITIALIZE_ARGS { - fn default() -> Self { - let mut s = ::std::mem::MaybeUninit::::uninit(); - unsafe { - ::std::ptr::write_bytes(s.as_mut_ptr(), 0, 1); - s.assume_init() - } - } -} -pub type CK_BYTE = ::std::os::raw::c_uchar; -pub type CK_CHAR = ::std::os::raw::c_uchar; -pub type CK_UTF8CHAR = ::std::os::raw::c_uchar; -pub type CK_BBOOL = ::std::os::raw::c_uchar; -pub type CK_ULONG = ::std::os::raw::c_ulong; -pub type CK_LONG = ::std::os::raw::c_long; -pub type CK_BYTE_PTR = *mut CK_BYTE; -pub type CK_CHAR_PTR = *mut CK_CHAR; -pub type CK_UTF8CHAR_PTR = *mut CK_UTF8CHAR; -pub type CK_ULONG_PTR = *mut CK_ULONG; -pub type CK_VOID_PTR = *mut ::std::os::raw::c_void; -pub type CK_VOID_PTR_PTR = *mut *mut ::std::os::raw::c_void; -pub type CK_VERSION = _CK_VERSION; -pub type CK_VERSION_PTR = *mut _CK_VERSION; -pub type CK_INFO = _CK_INFO; -pub type CK_INFO_PTR = *mut _CK_INFO; -pub type CK_SLOT_ID_PTR = *mut CK_SLOT_ID; -pub type CK_SLOT_INFO = _CK_SLOT_INFO; -pub type CK_SLOT_INFO_PTR = *mut _CK_SLOT_INFO; -pub type CK_TOKEN_INFO = _CK_TOKEN_INFO; -pub type CK_TOKEN_INFO_PTR = *mut _CK_TOKEN_INFO; -pub type CK_SESSION_HANDLE_PTR = *mut CK_SESSION_HANDLE; -pub type CK_SESSION_INFO = _CK_SESSION_INFO; -pub type CK_SESSION_INFO_PTR = *mut _CK_SESSION_INFO; -pub type CK_OBJECT_HANDLE_PTR = *mut CK_OBJECT_HANDLE; -pub type CK_OBJECT_CLASS_PTR = *mut CK_OBJECT_CLASS; -pub type CK_ATTRIBUTE = _CK_ATTRIBUTE; -pub type CK_ATTRIBUTE_PTR = *mut _CK_ATTRIBUTE; -pub type CK_DATE = _CK_DATE; -pub type CK_DATE_PTR = *mut _CK_DATE; -pub type CK_MECHANISM_TYPE_PTR = *mut CK_MECHANISM_TYPE; -pub type CK_MECHANISM = _CK_MECHANISM; -pub type CK_MECHANISM_PTR = *mut _CK_MECHANISM; -pub type CK_MECHANISM_INFO = _CK_MECHANISM_INFO; -pub type CK_MECHANISM_INFO_PTR = *mut _CK_MECHANISM_INFO; -#[repr(C)] -#[derive(Debug, Copy, Clone)] -pub struct ck_otp_mechanism_info { - _unused: [u8; 0], -} -pub type CK_OTP_MECHANISM_INFO = ck_otp_mechanism_info; -pub type CK_OTP_MECHANISM_INFO_PTR = *mut ck_otp_mechanism_info; -pub type CK_FUNCTION_LIST = _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR = *mut _CK_FUNCTION_LIST; -pub type CK_FUNCTION_LIST_PTR_PTR = *mut *mut _CK_FUNCTION_LIST; -pub type CK_C_INITIALIZE_ARGS = _CK_C_INITIALIZE_ARGS; -pub type CK_C_INITIALIZE_ARGS_PTR = *mut _CK_C_INITIALIZE_ARGS; -pub type CK_RSA_PKCS_PSS_PARAMS = ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_PSS_PARAMS_PTR = *mut ck_rsa_pkcs_pss_params; -pub type CK_RSA_PKCS_OAEP_PARAMS = ck_rsa_pkcs_oaep_params; -pub type CK_RSA_PKCS_OAEP_PARAMS_PTR = *mut ck_rsa_pkcs_oaep_params; -pub type CK_AES_CTR_PARAMS = ck_aes_ctr_params; -pub type CK_AES_CTR_PARAMS_PTR = *mut ck_aes_ctr_params; -pub type CK_GCM_PARAMS = ck_gcm_params; -pub type CK_GCM_PARAMS_PTR = *mut ck_gcm_params; -pub type CK_ECDH1_DERIVE_PARAMS = ck_ecdh1_derive_params; -pub type CK_ECDH1_DERIVE_PARAMS_PTR = *mut ck_ecdh1_derive_params; -pub type CK_KEY_DERIVATION_STRING_DATA = ck_key_derivation_string_data; -pub type CK_KEY_DERIVATION_STRING_DATA_PTR = *mut ck_key_derivation_string_data; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS = ck_des_cbc_encrypt_data_params; -pub type CK_DES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_des_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS = ck_aes_cbc_encrypt_data_params; -pub type CK_AES_CBC_ENCRYPT_DATA_PARAMS_PTR = *mut ck_aes_cbc_encrypt_data_params; extern crate libloading; pub struct Pkcs11 { __library: ::libloading::Library, pub C_Initialize: Result< - unsafe extern "C" fn(init_args: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, pub C_Finalize: Result< - unsafe extern "C" fn(pReserved: *mut ::std::os::raw::c_void) -> CK_RV, + unsafe extern "C" fn(arg1: *mut ::std::os::raw::c_void) -> CK_RV, ::libloading::Error, >, - pub C_GetInfo: Result CK_RV, ::libloading::Error>, + pub C_GetInfo: Result CK_RV, ::libloading::Error>, pub C_GetFunctionList: Result< - unsafe extern "C" fn(function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV, + unsafe extern "C" fn(arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV, ::libloading::Error, >, pub C_GetSlotList: Result< - unsafe extern "C" fn( - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_BBOOL, arg2: *mut CK_SLOT_ID, arg3: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, pub C_GetSlotInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetTokenInfo: Result< - unsafe extern "C" fn(slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV, - ::libloading::Error, - >, - pub C_WaitForSlotEvent: Result< - unsafe extern "C" fn( - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismList: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetMechanismInfo: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV, ::libloading::Error, >, pub C_InitToken: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV, ::libloading::Error, >, pub C_InitPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetPIN: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_OpenSession: Result< unsafe extern "C" fn( - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CloseSession: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CloseAllSessions: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_GetSessionInfo: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, info: *mut _CK_SESSION_INFO) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_SESSION_INFO) -> CK_RV, ::libloading::Error, >, pub C_GetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetOperationState: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_Login: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_Logout: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_CreateObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_CopyObject: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, pub C_DestroyObject: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, object: CK_OBJECT_HANDLE) -> CK_RV, + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, ::libloading::Error, >, pub C_GetObjectSize: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_GetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_SetAttributeValue: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjects: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, pub C_FindObjectsFinal: - Result CK_RV, ::libloading::Error>, + Result CK_RV, ::libloading::Error>, pub C_EncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Encrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_EncryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Decrypt: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptUpdate: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DecryptFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestInit: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV, + ::libloading::Error, + >, + pub C_Digest: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestKey: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV, + ::libloading::Error, + >, + pub C_DigestFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Sign: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_SignFinal: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecoverInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_SignRecover: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Encrypt: Result< + pub C_VerifyInit: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_Verify: Result< + unsafe extern "C" fn( + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyUpdate: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyFinal: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, + ::libloading::Error, + >, + pub C_VerifyRecoverInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptUpdate: Result< + pub C_VerifyRecover: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_EncryptFinal: Result< + pub C_DigestEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptInit: Result< + pub C_DecryptDigestUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Decrypt: Result< + pub C_SignEncryptUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptUpdate: Result< + pub C_DecryptVerifyUpdate: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptFinal: Result< + pub C_GenerateKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestInit: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, mechanism: *mut _CK_MECHANISM) -> CK_RV, - ::libloading::Error, - >, - pub C_Digest: Result< + pub C_GenerateKeyPair: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestUpdate: Result< + pub C_WrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestKey: Result< - unsafe extern "C" fn(session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV, - ::libloading::Error, - >, - pub C_DigestFinal: Result< + pub C_UnwrapKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_SignInit: Result< + pub C_DeriveKey: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_Sign: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_SeedRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignUpdate: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - ) -> CK_RV, + pub C_GenerateRandom: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: *mut CK_BYTE, arg3: CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignFinal: Result< + pub C_GetFunctionStatus: + Result CK_RV, ::libloading::Error>, + pub C_CancelFunction: + Result CK_RV, ::libloading::Error>, + pub C_WaitForSlotEvent: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, ) -> CK_RV, ::libloading::Error, >, - pub C_SignRecoverInit: Result< - unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, - ) -> CK_RV, + pub C_GetInterfaceList: Result< + unsafe extern "C" fn(arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV, ::libloading::Error, >, - pub C_SignRecover: Result< + pub C_GetInterface: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyInit: Result< + pub C_LoginUser: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_Verify: Result< + pub C_SessionCancel: Result< + unsafe extern "C" fn(arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV, + ::libloading::Error, + >, + pub C_MessageEncryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyUpdate: Result< + pub C_EncryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyFinal: Result< + pub C_EncryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecoverInit: Result< + pub C_EncryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_VerifyRecover: Result< + pub C_MessageEncryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageDecryptInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DigestEncryptUpdate: Result< + pub C_DecryptMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptDigestUpdate: Result< + pub C_DecryptMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SignEncryptUpdate: Result< + pub C_DecryptMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, ) -> CK_RV, ::libloading::Error, >, - pub C_DecryptVerifyUpdate: Result< + pub C_MessageDecryptFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageSignInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKey: Result< + pub C_SignMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateKeyPair: Result< + pub C_SignMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_WrapKey: Result< + pub C_SignMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_UnwrapKey: Result< + pub C_MessageSignFinal: + Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyInit: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV, ::libloading::Error, >, - pub C_DeriveKey: Result< + pub C_VerifyMessage: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_SeedRandom: Result< + pub C_VerifyMessageBegin: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GenerateRandom: Result< + pub C_VerifyMessageNext: Result< unsafe extern "C" fn( - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, ) -> CK_RV, ::libloading::Error, >, - pub C_GetFunctionStatus: - Result CK_RV, ::libloading::Error>, - pub C_CancelFunction: - Result CK_RV, ::libloading::Error>, + pub C_MessageVerifyFinal: + Result CK_RV, ::libloading::Error>, } impl Pkcs11 { pub unsafe fn new

(path: P) -> Result @@ -4064,7 +11337,6 @@ impl Pkcs11 { let C_GetSlotList = __library.get(b"C_GetSlotList\0").map(|sym| *sym); let C_GetSlotInfo = __library.get(b"C_GetSlotInfo\0").map(|sym| *sym); let C_GetTokenInfo = __library.get(b"C_GetTokenInfo\0").map(|sym| *sym); - let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); let C_GetMechanismList = __library.get(b"C_GetMechanismList\0").map(|sym| *sym); let C_GetMechanismInfo = __library.get(b"C_GetMechanismInfo\0").map(|sym| *sym); let C_InitToken = __library.get(b"C_InitToken\0").map(|sym| *sym); @@ -4125,6 +11397,31 @@ impl Pkcs11 { let C_GenerateRandom = __library.get(b"C_GenerateRandom\0").map(|sym| *sym); let C_GetFunctionStatus = __library.get(b"C_GetFunctionStatus\0").map(|sym| *sym); let C_CancelFunction = __library.get(b"C_CancelFunction\0").map(|sym| *sym); + let C_WaitForSlotEvent = __library.get(b"C_WaitForSlotEvent\0").map(|sym| *sym); + let C_GetInterfaceList = __library.get(b"C_GetInterfaceList\0").map(|sym| *sym); + let C_GetInterface = __library.get(b"C_GetInterface\0").map(|sym| *sym); + let C_LoginUser = __library.get(b"C_LoginUser\0").map(|sym| *sym); + let C_SessionCancel = __library.get(b"C_SessionCancel\0").map(|sym| *sym); + let C_MessageEncryptInit = __library.get(b"C_MessageEncryptInit\0").map(|sym| *sym); + let C_EncryptMessage = __library.get(b"C_EncryptMessage\0").map(|sym| *sym); + let C_EncryptMessageBegin = __library.get(b"C_EncryptMessageBegin\0").map(|sym| *sym); + let C_EncryptMessageNext = __library.get(b"C_EncryptMessageNext\0").map(|sym| *sym); + let C_MessageEncryptFinal = __library.get(b"C_MessageEncryptFinal\0").map(|sym| *sym); + let C_MessageDecryptInit = __library.get(b"C_MessageDecryptInit\0").map(|sym| *sym); + let C_DecryptMessage = __library.get(b"C_DecryptMessage\0").map(|sym| *sym); + let C_DecryptMessageBegin = __library.get(b"C_DecryptMessageBegin\0").map(|sym| *sym); + let C_DecryptMessageNext = __library.get(b"C_DecryptMessageNext\0").map(|sym| *sym); + let C_MessageDecryptFinal = __library.get(b"C_MessageDecryptFinal\0").map(|sym| *sym); + let C_MessageSignInit = __library.get(b"C_MessageSignInit\0").map(|sym| *sym); + let C_SignMessage = __library.get(b"C_SignMessage\0").map(|sym| *sym); + let C_SignMessageBegin = __library.get(b"C_SignMessageBegin\0").map(|sym| *sym); + let C_SignMessageNext = __library.get(b"C_SignMessageNext\0").map(|sym| *sym); + let C_MessageSignFinal = __library.get(b"C_MessageSignFinal\0").map(|sym| *sym); + let C_MessageVerifyInit = __library.get(b"C_MessageVerifyInit\0").map(|sym| *sym); + let C_VerifyMessage = __library.get(b"C_VerifyMessage\0").map(|sym| *sym); + let C_VerifyMessageBegin = __library.get(b"C_VerifyMessageBegin\0").map(|sym| *sym); + let C_VerifyMessageNext = __library.get(b"C_VerifyMessageNext\0").map(|sym| *sym); + let C_MessageVerifyFinal = __library.get(b"C_MessageVerifyFinal\0").map(|sym| *sym); Ok(Pkcs11 { __library, C_Initialize, @@ -4134,7 +11431,6 @@ impl Pkcs11 { C_GetSlotList, C_GetSlotInfo, C_GetTokenInfo, - C_WaitForSlotEvent, C_GetMechanismList, C_GetMechanismInfo, C_InitToken, @@ -4195,872 +11491,1058 @@ impl Pkcs11 { C_GenerateRandom, C_GetFunctionStatus, C_CancelFunction, + C_WaitForSlotEvent, + C_GetInterfaceList, + C_GetInterface, + C_LoginUser, + C_SessionCancel, + C_MessageEncryptInit, + C_EncryptMessage, + C_EncryptMessageBegin, + C_EncryptMessageNext, + C_MessageEncryptFinal, + C_MessageDecryptInit, + C_DecryptMessage, + C_DecryptMessageBegin, + C_DecryptMessageNext, + C_MessageDecryptFinal, + C_MessageSignInit, + C_SignMessage, + C_SignMessageBegin, + C_SignMessageNext, + C_MessageSignFinal, + C_MessageVerifyInit, + C_VerifyMessage, + C_VerifyMessageBegin, + C_VerifyMessageNext, + C_MessageVerifyFinal, }) } - pub unsafe fn C_Initialize(&self, init_args: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Initialize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Initialize .as_ref() - .expect("Expected function, got error."))(init_args) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_Finalize(&self, pReserved: *mut ::std::os::raw::c_void) -> CK_RV { + pub unsafe fn C_Finalize(&self, arg1: *mut ::std::os::raw::c_void) -> CK_RV { (self .C_Finalize .as_ref() - .expect("Expected function, got error."))(pReserved) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetInfo(&self, info: *mut _CK_INFO) -> CK_RV { + pub unsafe fn C_GetInfo(&self, arg1: *mut CK_INFO) -> CK_RV { (self .C_GetInfo .as_ref() - .expect("Expected function, got error."))(info) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_GetFunctionList(&self, function_list: *mut *mut _CK_FUNCTION_LIST) -> CK_RV { + pub unsafe fn C_GetFunctionList(&self, arg1: *mut *mut CK_FUNCTION_LIST) -> CK_RV { (self .C_GetFunctionList .as_ref() - .expect("Expected function, got error."))(function_list) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSlotList( &self, - token_present: ::std::os::raw::c_uchar, - slot_list: *mut CK_SLOT_ID, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_BBOOL, + arg2: *mut CK_SLOT_ID, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetSlotList .as_ref() - .expect("Expected function, got error."))(token_present, slot_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetSlotInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_SLOT_INFO) -> CK_RV { + pub unsafe fn C_GetSlotInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_SLOT_INFO) -> CK_RV { (self .C_GetSlotInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) + .expect("Expected function, got error."))(arg1, arg2) } - pub unsafe fn C_GetTokenInfo(&self, slotID: CK_SLOT_ID, info: *mut _CK_TOKEN_INFO) -> CK_RV { + pub unsafe fn C_GetTokenInfo(&self, arg1: CK_SLOT_ID, arg2: *mut CK_TOKEN_INFO) -> CK_RV { (self .C_GetTokenInfo .as_ref() - .expect("Expected function, got error."))(slotID, info) - } - pub unsafe fn C_WaitForSlotEvent( - &self, - flags: CK_FLAGS, - slot: *mut CK_SLOT_ID, - pReserved: *mut ::std::os::raw::c_void, - ) -> CK_RV { - (self - .C_WaitForSlotEvent - .as_ref() - .expect("Expected function, got error."))(flags, slot, pReserved) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetMechanismList( &self, - slotID: CK_SLOT_ID, - mechanism_list: *mut CK_MECHANISM_TYPE, - ulCount: *mut ::std::os::raw::c_ulong, + arg1: CK_SLOT_ID, + arg2: *mut CK_MECHANISM_TYPE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetMechanismList .as_ref() - .expect("Expected function, got error."))(slotID, mechanism_list, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetMechanismInfo( &self, - slotID: CK_SLOT_ID, - type_: CK_MECHANISM_TYPE, - info: *mut _CK_MECHANISM_INFO, + arg1: CK_SLOT_ID, + arg2: CK_MECHANISM_TYPE, + arg3: *mut CK_MECHANISM_INFO, ) -> CK_RV { (self .C_GetMechanismInfo .as_ref() - .expect("Expected function, got error."))(slotID, type_, info) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_InitToken( &self, - slotID: CK_SLOT_ID, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, - label: *mut ::std::os::raw::c_uchar, + arg1: CK_SLOT_ID, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, ) -> CK_RV { (self .C_InitToken .as_ref() - .expect("Expected function, got error."))(slotID, pin, pin_len, label) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_InitPIN( &self, - session: CK_SESSION_HANDLE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, ) -> CK_RV { (self .C_InitPIN .as_ref() - .expect("Expected function, got error."))(session, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetPIN( &self, - session: CK_SESSION_HANDLE, - old_pin: *mut ::std::os::raw::c_uchar, - old_len: ::std::os::raw::c_ulong, - new_pin: *mut ::std::os::raw::c_uchar, - new_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_UTF8CHAR, + arg3: CK_ULONG, + arg4: *mut CK_UTF8CHAR, + arg5: CK_ULONG, ) -> CK_RV { (self .C_SetPIN .as_ref() - .expect("Expected function, got error."))( - session, old_pin, old_len, new_pin, new_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_OpenSession( &self, - slotID: CK_SLOT_ID, - flags: CK_FLAGS, - application: *mut ::std::os::raw::c_void, - notify: CK_NOTIFY, - session: *mut CK_SESSION_HANDLE, + arg1: CK_SLOT_ID, + arg2: CK_FLAGS, + arg3: *mut ::std::os::raw::c_void, + arg4: CK_NOTIFY, + arg5: *mut CK_SESSION_HANDLE, ) -> CK_RV { (self .C_OpenSession .as_ref() - .expect("Expected function, got error."))( - slotID, flags, application, notify, session - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_CloseSession(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CloseSession(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CloseSession .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CloseAllSessions(&self, slotID: CK_SLOT_ID) -> CK_RV { + pub unsafe fn C_CloseAllSessions(&self, arg1: CK_SLOT_ID) -> CK_RV { (self .C_CloseAllSessions .as_ref() - .expect("Expected function, got error."))(slotID) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_GetSessionInfo( &self, - session: CK_SESSION_HANDLE, - info: *mut _CK_SESSION_INFO, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_SESSION_INFO, ) -> CK_RV { (self .C_GetSessionInfo .as_ref() - .expect("Expected function, got error."))(session, info) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetOperationState .as_ref() - .expect("Expected function, got error."))( - session, operation_state, operation_state_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SetOperationState( &self, - session: CK_SESSION_HANDLE, - operation_state: *mut ::std::os::raw::c_uchar, - operation_state_len: ::std::os::raw::c_ulong, - encryption_key: CK_OBJECT_HANDLE, - authentiation_key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: CK_OBJECT_HANDLE, + arg5: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SetOperationState .as_ref() - .expect("Expected function, got error."))( - session, - operation_state, - operation_state_len, - encryption_key, - authentiation_key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_Login( &self, - session: CK_SESSION_HANDLE, - user_type: CK_USER_TYPE, - pin: *mut ::std::os::raw::c_uchar, - pin_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, ) -> CK_RV { (self .C_Login .as_ref() - .expect("Expected function, got error."))(session, user_type, pin, pin_len) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_Logout(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_Logout(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_Logout .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_CreateObject( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, + arg4: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CreateObject .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount, object) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_CopyObject( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - new_object: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_CopyObject .as_ref() - .expect("Expected function, got error."))( - session, object, templ, ulCount, new_object - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } - pub unsafe fn C_DestroyObject( - &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - ) -> CK_RV { + pub unsafe fn C_DestroyObject(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DestroyObject .as_ref() - .expect("Expected function, got error."))(session, object) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_GetObjectSize( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - size: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_GetObjectSize .as_ref() - .expect("Expected function, got error."))(session, object, size) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_GetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_SetAttributeValue( &self, - session: CK_SESSION_HANDLE, - object: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: CK_OBJECT_HANDLE, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, ) -> CK_RV { (self .C_SetAttributeValue .as_ref() - .expect("Expected function, got error."))(session, object, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } pub unsafe fn C_FindObjectsInit( &self, - session: CK_SESSION_HANDLE, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_ATTRIBUTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_FindObjectsInit .as_ref() - .expect("Expected function, got error."))(session, templ, ulCount) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_FindObjects( &self, - session: CK_SESSION_HANDLE, - object: *mut CK_OBJECT_HANDLE, - max_object_count: ::std::os::raw::c_ulong, - object_count: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_OBJECT_HANDLE, + arg3: CK_ULONG, + arg4: *mut CK_ULONG, ) -> CK_RV { (self .C_FindObjects .as_ref() - .expect("Expected function, got error."))( - session, - object, - max_object_count, - object_count, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) } - pub unsafe fn C_FindObjectsFinal(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_FindObjectsFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_FindObjectsFinal .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } pub unsafe fn C_EncryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_EncryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Encrypt( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Encrypt .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - encrypted_data, - encrypted_data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_EncryptFinal( &self, - session: CK_SESSION_HANDLE, - last_encrypted_part: *mut ::std::os::raw::c_uchar, - last_encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_EncryptFinal .as_ref() - .expect("Expected function, got error."))( - session, - last_encrypted_part, - last_encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_DecryptInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DecryptInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Decrypt( &self, - session: CK_SESSION_HANDLE, - encrypted_data: *mut ::std::os::raw::c_uchar, - encrypted_data_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Decrypt .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_data, - encrypted_data_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptFinal( &self, - session: CK_SESSION_HANDLE, - last_part: *mut ::std::os::raw::c_uchar, - last_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptFinal .as_ref() - .expect("Expected function, got error."))(session, last_part, last_part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestInit( - &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - ) -> CK_RV { + pub unsafe fn C_DigestInit(&self, arg1: CK_SESSION_HANDLE, arg2: *mut CK_MECHANISM) -> CK_RV { (self .C_DigestInit .as_ref() - .expect("Expected function, got error."))(session, mechanism) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_Digest( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_Digest .as_ref() - .expect("Expected function, got error."))( - session, data, data_len, digest, digest_len - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_DigestUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_DigestKey(&self, session: CK_SESSION_HANDLE, key: CK_OBJECT_HANDLE) -> CK_RV { + pub unsafe fn C_DigestKey(&self, arg1: CK_SESSION_HANDLE, arg2: CK_OBJECT_HANDLE) -> CK_RV { (self .C_DigestKey .as_ref() - .expect("Expected function, got error."))(session, key) + .expect("Expected function, got error."))(arg1, arg2) } pub unsafe fn C_DigestFinal( &self, - session: CK_SESSION_HANDLE, - digest: *mut ::std::os::raw::c_uchar, - digest_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestFinal .as_ref() - .expect("Expected function, got error."))(session, digest, digest_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Sign( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { - (self.C_Sign.as_ref().expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + (self.C_Sign.as_ref().expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SignUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: *mut CK_ULONG, ) -> CK_RV { (self .C_SignFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_SignRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_SignRecover( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignRecover .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_Verify( &self, - session: CK_SESSION_HANDLE, - data: *mut ::std::os::raw::c_uchar, - data_len: ::std::os::raw::c_ulong, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, ) -> CK_RV { (self .C_Verify .as_ref() - .expect("Expected function, got error."))( - session, - data, - data_len, - signature, - signature_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_VerifyUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyUpdate .as_ref() - .expect("Expected function, got error."))(session, part, part_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyFinal( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_VerifyFinal .as_ref() - .expect("Expected function, got error."))(session, signature, signature_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecoverInit( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - key: CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_VerifyRecoverInit .as_ref() - .expect("Expected function, got error."))(session, mechanism, key) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_VerifyRecover( &self, - session: CK_SESSION_HANDLE, - signature: *mut ::std::os::raw::c_uchar, - signature_len: ::std::os::raw::c_ulong, - data: *mut ::std::os::raw::c_uchar, - data_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_VerifyRecover .as_ref() - .expect("Expected function, got error."))( - session, - signature, - signature_len, - data, - data_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DigestEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DigestEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptDigestUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptDigestUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_SignEncryptUpdate( &self, - session: CK_SESSION_HANDLE, - part: *mut ::std::os::raw::c_uchar, - part_len: ::std::os::raw::c_ulong, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_SignEncryptUpdate .as_ref() - .expect("Expected function, got error."))( - session, - part, - part_len, - encrypted_part, - encrypted_part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_DecryptVerifyUpdate( &self, - session: CK_SESSION_HANDLE, - encrypted_part: *mut ::std::os::raw::c_uchar, - encrypted_part_len: ::std::os::raw::c_ulong, - part: *mut ::std::os::raw::c_uchar, - part_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, ) -> CK_RV { (self .C_DecryptVerifyUpdate .as_ref() - .expect("Expected function, got error."))( - session, - encrypted_part, - encrypted_part_len, - part, - part_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - templ: *mut _CK_ATTRIBUTE, - ulCount: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKey .as_ref() - .expect("Expected function, got error."))( - session, mechanism, templ, ulCount, key - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) } pub unsafe fn C_GenerateKeyPair( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - public_key_template: *mut _CK_ATTRIBUTE, - public_key_attribute_count: ::std::os::raw::c_ulong, - private_key_template: *mut _CK_ATTRIBUTE, - private_key_attribute_count: ::std::os::raw::c_ulong, - public_key: *mut CK_OBJECT_HANDLE, - private_key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: *mut CK_ATTRIBUTE, + arg4: CK_ULONG, + arg5: *mut CK_ATTRIBUTE, + arg6: CK_ULONG, + arg7: *mut CK_OBJECT_HANDLE, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_GenerateKeyPair .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - public_key_template, - public_key_attribute_count, - private_key_template, - private_key_attribute_count, - public_key, - private_key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_WrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - wrapping_key: CK_OBJECT_HANDLE, - key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: *mut ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: CK_OBJECT_HANDLE, + arg5: *mut CK_BYTE, + arg6: *mut CK_ULONG, ) -> CK_RV { (self .C_WrapKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - wrapping_key, - key, - wrapped_key, - wrapped_key_len, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_UnwrapKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - unwrapping_key: CK_OBJECT_HANDLE, - wrapped_key: *mut ::std::os::raw::c_uchar, - wrapped_key_len: ::std::os::raw::c_ulong, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_BYTE, + arg5: *mut CK_ULONG, + arg6: *mut CK_ATTRIBUTE, + arg7: CK_ULONG, + arg8: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_UnwrapKey .as_ref() .expect("Expected function, got error."))( - session, - mechanism, - unwrapping_key, - wrapped_key, - wrapped_key_len, - templ, - attribute_count, - key, + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, ) } pub unsafe fn C_DeriveKey( &self, - session: CK_SESSION_HANDLE, - mechanism: *mut _CK_MECHANISM, - base_key: CK_OBJECT_HANDLE, - templ: *mut _CK_ATTRIBUTE, - attribute_count: ::std::os::raw::c_ulong, - key: *mut CK_OBJECT_HANDLE, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + arg4: *mut CK_ATTRIBUTE, + arg5: CK_ULONG, + arg6: *mut CK_OBJECT_HANDLE, ) -> CK_RV { (self .C_DeriveKey .as_ref() - .expect("Expected function, got error."))( - session, - mechanism, - base_key, - templ, - attribute_count, - key, - ) + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) } pub unsafe fn C_SeedRandom( &self, - session: CK_SESSION_HANDLE, - seed: *mut ::std::os::raw::c_uchar, - seed_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_SeedRandom .as_ref() - .expect("Expected function, got error."))(session, seed, seed_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } pub unsafe fn C_GenerateRandom( &self, - session: CK_SESSION_HANDLE, - random_data: *mut ::std::os::raw::c_uchar, - random_len: ::std::os::raw::c_ulong, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_BYTE, + arg3: CK_ULONG, ) -> CK_RV { (self .C_GenerateRandom .as_ref() - .expect("Expected function, got error."))(session, random_data, random_len) + .expect("Expected function, got error."))(arg1, arg2, arg3) } - pub unsafe fn C_GetFunctionStatus(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_GetFunctionStatus(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_GetFunctionStatus .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) } - pub unsafe fn C_CancelFunction(&self, session: CK_SESSION_HANDLE) -> CK_RV { + pub unsafe fn C_CancelFunction(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { (self .C_CancelFunction .as_ref() - .expect("Expected function, got error."))(session) + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_WaitForSlotEvent( + &self, + arg1: CK_FLAGS, + arg2: *mut CK_SLOT_ID, + arg3: *mut ::std::os::raw::c_void, + ) -> CK_RV { + (self + .C_WaitForSlotEvent + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_GetInterfaceList(&self, arg1: *mut CK_INTERFACE, arg2: *mut CK_ULONG) -> CK_RV { + (self + .C_GetInterfaceList + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_GetInterface( + &self, + arg1: *mut CK_UTF8CHAR, + arg2: *mut CK_VERSION, + arg3: *mut *mut CK_INTERFACE, + arg4: CK_FLAGS, + ) -> CK_RV { + (self + .C_GetInterface + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4) + } + pub unsafe fn C_LoginUser( + &self, + arg1: CK_SESSION_HANDLE, + arg2: CK_USER_TYPE, + arg3: *mut CK_UTF8CHAR, + arg4: CK_ULONG, + arg5: *mut CK_UTF8CHAR, + arg6: CK_ULONG, + ) -> CK_RV { + (self + .C_LoginUser + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5, arg6) + } + pub unsafe fn C_SessionCancel(&self, arg1: CK_SESSION_HANDLE, arg2: CK_FLAGS) -> CK_RV { + (self + .C_SessionCancel + .as_ref() + .expect("Expected function, got error."))(arg1, arg2) + } + pub unsafe fn C_MessageEncryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageEncryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_EncryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_EncryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_EncryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_EncryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_EncryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageEncryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageEncryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageDecryptInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageDecryptInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_DecryptMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + arg8: *mut CK_BYTE, + arg9: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, arg9, + ) + } + pub unsafe fn C_DecryptMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + ) -> CK_RV { + (self + .C_DecryptMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3, arg4, arg5) + } + pub unsafe fn C_DecryptMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + arg8: CK_FLAGS, + ) -> CK_RV { + (self + .C_DecryptMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7, arg8, + ) + } + pub unsafe fn C_MessageDecryptFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageDecryptFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageSignInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageSignInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_SignMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_SignMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: *mut CK_ULONG, + ) -> CK_RV { + (self + .C_SignMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageSignFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageSignFinal + .as_ref() + .expect("Expected function, got error."))(arg1) + } + pub unsafe fn C_MessageVerifyInit( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut CK_MECHANISM, + arg3: CK_OBJECT_HANDLE, + ) -> CK_RV { + (self + .C_MessageVerifyInit + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessage( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessage + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_VerifyMessageBegin( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageBegin + .as_ref() + .expect("Expected function, got error."))(arg1, arg2, arg3) + } + pub unsafe fn C_VerifyMessageNext( + &self, + arg1: CK_SESSION_HANDLE, + arg2: *mut ::std::os::raw::c_void, + arg3: CK_ULONG, + arg4: *mut CK_BYTE, + arg5: CK_ULONG, + arg6: *mut CK_BYTE, + arg7: CK_ULONG, + ) -> CK_RV { + (self + .C_VerifyMessageNext + .as_ref() + .expect("Expected function, got error."))( + arg1, arg2, arg3, arg4, arg5, arg6, arg7 + ) + } + pub unsafe fn C_MessageVerifyFinal(&self, arg1: CK_SESSION_HANDLE) -> CK_RV { + (self + .C_MessageVerifyFinal + .as_ref() + .expect("Expected function, got error."))(arg1) } } diff --git a/cryptoki-sys/src/lib.rs b/cryptoki-sys/src/lib.rs index 31563aa5..29b58c59 100644 --- a/cryptoki-sys/src/lib.rs +++ b/cryptoki-sys/src/lib.rs @@ -138,22 +138,6 @@ include!(concat!( #[cfg(feature = "generate-bindings")] include!(concat!(env!("OUT_DIR"), "/pkcs11_bindings.rs")); -/// Typedefs and defines for the CKM_X9_42_DH_KEY_PAIR_GEN and the -/// CKM_X9_42_DH_PARAMETER_GEN mechanisms -pub type CK_X9_42_DH_KDF_TYPE = CK_ULONG; -pub type CK_X9_42_DH_KDF_TYPE_PTR = *mut CK_X9_42_DH_KDF_TYPE; - -pub type CK_EC_KDF_TYPE = CK_ULONG; - -// The values below are defined in pkcs11.h with `#define` macros. As a result, bindgen cannot -// generate bindings for them. They are included here for completeness. -pub const CKA_WRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = CKF_ARRAY_ATTRIBUTE | 0x00000211; -pub const CKA_UNWRAP_TEMPLATE: CK_ATTRIBUTE_TYPE = CKF_ARRAY_ATTRIBUTE | 0x00000212; -pub const CKA_DERIVE_TEMPLATE: CK_ATTRIBUTE_TYPE = CKF_ARRAY_ATTRIBUTE | 0x00000213; -pub const CKA_ALLOWED_MECHANISMS: CK_ATTRIBUTE_TYPE = CKF_ARRAY_ATTRIBUTE | 0x00000600; -pub const CK_UNAVAILABLE_INFORMATION: CK_ULONG = !0; -pub const CKF_EXTENSION: CK_FLAGS = 0x80000000; -pub const CKK_EC_MONTGOMERY: CK_KEY_TYPE = 0x00000041; -pub const CKR_VENDOR_DEFINED: CK_RV = 0x80000000; -pub const CKR_CURVE_NOT_SUPPORTED: CK_RV = 0x00000140; -pub const CKM_VENDOR_DEFINED: CK_MECHANISM_TYPE = 0x80000000; +// bindgen generates u64::MAX value for ~0UL macro definition, it's not valid on 32bit ulong platforms. +// This is a workaround for that. +pub const CK_UNAVAILABLE_INFORMATION: CK_ULONG = CK_ULONG::MAX; diff --git a/cryptoki-sys/vendor/README.md b/cryptoki-sys/vendor/README.md new file mode 100644 index 00000000..1dfbcba0 --- /dev/null +++ b/cryptoki-sys/vendor/README.md @@ -0,0 +1,7 @@ +Vendor + +This is downloaded from https://github.com/latchset/pkcs11-headers/blob/b131b9e4599db6e0287a3d74f6768e08a0c82d23/public-domain/3.0/pkcs11.h: + +```shell +wget https://raw.githubusercontent.com/latchset/pkcs11-headers/b131b9e4599db6e0287a3d74f6768e08a0c82d23/public-domain/3.0/pkcs11.h +``` \ No newline at end of file diff --git a/cryptoki-sys/vendor/pkcs11.h b/cryptoki-sys/vendor/pkcs11.h new file mode 100644 index 00000000..ef3e572d --- /dev/null +++ b/cryptoki-sys/vendor/pkcs11.h @@ -0,0 +1,2341 @@ +/* This file is in the Public Domain */ + +#ifndef _PD_PKCS11_ +#define _PD_PKCS11_ + +#define CRYPTOKI_VERSION_MAJOR 3 +#define CRYPTOKI_VERSION_MINOR 0 +#define CRYPTOKI_VERSION_AMENDMENT 0 + +/* Basic types */ +typedef unsigned char CK_BBOOL; +typedef unsigned char CK_BYTE; +typedef unsigned char CK_CHAR; +typedef unsigned char CK_UTF8CHAR; +typedef unsigned long int CK_ULONG; + +typedef CK_BBOOL * CK_BBOOL_PTR; +typedef CK_BYTE * CK_BYTE_PTR; +typedef CK_CHAR * CK_CHAR_PTR; +typedef CK_UTF8CHAR * CK_UTF8CHAR_PTR; +typedef CK_ULONG * CK_ULONG_PTR; + +/* Basic defines */ +#define NULL_PTR ((void *)0) +typedef void * CK_VOID_PTR; +typedef void ** CK_VOID_PTR_PTR; + +#define CK_EFFECTIVELY_INFINITE 0UL +#define CK_UNAVAILABLE_INFORMATION ~0UL +#define CK_INVALID_HANDLE 0UL +#define CK_TRUE 1 +#define CK_FALSE 0 + +/* CK_ types in alphabetical order */ +#define ULONGDEF(__name__) \ +typedef CK_ULONG __name__; \ +typedef __name__ * __name__ ## _PTR; + +ULONGDEF(CK_ATTRIBUTE_TYPE); +ULONGDEF(CK_CERTIFICATE_CATEGORY); +ULONGDEF(CK_CERTIFICATE_TYPE); +ULONGDEF(CK_EC_KDF_TYPE); +ULONGDEF(CK_EXTRACT_PARAMS); +ULONGDEF(CK_FLAGS); +ULONGDEF(CK_GENERATOR_FUNCTION); +ULONGDEF(CK_HW_FEATURE_TYPE); +ULONGDEF(CK_JAVA_MIDP_SECURITY_DOMAIN); +ULONGDEF(CK_KEY_TYPE); +ULONGDEF(CK_MAC_GENERAL_PARAMS); +ULONGDEF(CK_MECHANISM_TYPE); +ULONGDEF(CK_NOTIFICATION); +ULONGDEF(CK_OBJECT_CLASS); +ULONGDEF(CK_OBJECT_HANDLE); +ULONGDEF(CK_OTP_PARAM_TYPE); +ULONGDEF(CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE); +ULONGDEF(CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE); +ULONGDEF(CK_PRF_DATA_TYPE); +ULONGDEF(CK_PROFILE_ID); +ULONGDEF(CK_RC2_PARAMS); +ULONGDEF(CK_RSA_PKCS_MGF_TYPE); +ULONGDEF(CK_RSA_PKCS_OAEP_SOURCE_TYPE); +ULONGDEF(CK_RV); +ULONGDEF(CK_SESSION_HANDLE); +ULONGDEF(CK_SLOT_ID); +ULONGDEF(CK_SP800_108_DKM_LENGTH_METHOD); +ULONGDEF(CK_STATE); +ULONGDEF(CK_USER_TYPE); +ULONGDEF(CK_X2RATCHET_KDF_TYPE); +ULONGDEF(CK_X3DH_KDF_TYPE); +ULONGDEF(CK_X9_42_DH_KDF_TYPE); +ULONGDEF(CK_XEDDSA_HASH_TYPE); + +/* domain specific values and constants */ + +/* CK (certificate) */ +#define CK_CERTIFICATE_CATEGORY_UNSPECIFIED 0UL +#define CK_CERTIFICATE_CATEGORY_TOKEN_USER 1UL +#define CK_CERTIFICATE_CATEGORY_AUTHORITY 2UL +#define CK_CERTIFICATE_CATEGORY_OTHER_ENTITY 3UL + +/* CK (OTP) */ +#define CK_OTP_VALUE 0UL +#define CK_OTP_PIN 1UL +#define CK_OTP_CHALLENGE 2UL +#define CK_OTP_TIME 3UL +#define CK_OTP_COUNTER 4UL +#define CK_OTP_FLAGS 5UL +#define CK_OTP_OUTPUT_LENGTH 6UL +#define CK_OTP_OUTPUT_FORMAT 7UL + +/* CK (OTP format) */ +#define CK_OTP_FORMAT_DECIMAL 0UL +#define CK_OTP_FORMAT_HEXADECIMAL 1UL +#define CK_OTP_FORMAT_ALPHANUMERIC 2UL +#define CK_OTP_FORMAT_BINARY 3UL + +/* CK (OTP requirement) */ +#define CK_OTP_PARAM_IGNORED 0UL +#define CK_OTP_PARAM_OPTIONAL 1UL +#define CK_OTP_PARAM_MANDATORY 2UL + +/* CK (security) */ +#define CK_SECURITY_DOMAIN_UNSPECIFIED 0UL +#define CK_SECURITY_DOMAIN_MANUFACTURER 1UL +#define CK_SECURITY_DOMAIN_OPERATOR 2UL +#define CK_SECURITY_DOMAIN_THIRD_PARTY 3UL + +/* CK (SP800 KDF) */ +#define CK_SP800_108_ITERATION_VARIABLE 0x00000001UL +#define CK_SP800_108_OPTIONAL_COUNTER 0x00000002UL +#define CK_SP800_108_COUNTER 0x00000002UL +#define CK_SP800_108_DKM_LENGTH 0x00000003UL +#define CK_SP800_108_BYTE_ARRAY 0x00000004UL + +/* CK (SP800 DKM) */ +#define CK_SP800_108_DKM_LENGTH_SUM_OF_KEYS 0x00000001UL +#define CK_SP800_108_DKM_LENGTH_SUM_OF_SEGMENTS 0x00000002UL + +/* CKA */ +#define CKA_CLASS 0x00000000UL +#define CKA_TOKEN 0x00000001UL +#define CKA_PRIVATE 0x00000002UL +#define CKA_LABEL 0x00000003UL +#define CKA_UNIQUE_ID 0x00000004UL +#define CKA_APPLICATION 0x00000010UL +#define CKA_VALUE 0x00000011UL +#define CKA_OBJECT_ID 0x00000012UL +#define CKA_CERTIFICATE_TYPE 0x00000080UL +#define CKA_ISSUER 0x00000081UL +#define CKA_SERIAL_NUMBER 0x00000082UL +#define CKA_AC_ISSUER 0x00000083UL +#define CKA_OWNER 0x00000084UL +#define CKA_ATTR_TYPES 0x00000085UL +#define CKA_TRUSTED 0x00000086UL +#define CKA_CERTIFICATE_CATEGORY 0x00000087UL +#define CKA_JAVA_MIDP_SECURITY_DOMAIN 0x00000088UL +#define CKA_URL 0x00000089UL +#define CKA_HASH_OF_SUBJECT_PUBLIC_KEY 0x0000008AUL +#define CKA_HASH_OF_ISSUER_PUBLIC_KEY 0x0000008BUL +#define CKA_NAME_HASH_ALGORITHM 0x0000008CUL +#define CKA_CHECK_VALUE 0x00000090UL +#define CKA_KEY_TYPE 0x00000100UL +#define CKA_SUBJECT 0x00000101UL +#define CKA_ID 0x00000102UL +#define CKA_SENSITIVE 0x00000103UL +#define CKA_ENCRYPT 0x00000104UL +#define CKA_DECRYPT 0x00000105UL +#define CKA_WRAP 0x00000106UL +#define CKA_UNWRAP 0x00000107UL +#define CKA_SIGN 0x00000108UL +#define CKA_SIGN_RECOVER 0x00000109UL +#define CKA_VERIFY 0x0000010AUL +#define CKA_VERIFY_RECOVER 0x0000010BUL +#define CKA_DERIVE 0x0000010CUL +#define CKA_START_DATE 0x00000110UL +#define CKA_END_DATE 0x00000111UL +#define CKA_MODULUS 0x00000120UL +#define CKA_MODULUS_BITS 0x00000121UL +#define CKA_PUBLIC_EXPONENT 0x00000122UL +#define CKA_PRIVATE_EXPONENT 0x00000123UL +#define CKA_PRIME_1 0x00000124UL +#define CKA_PRIME_2 0x00000125UL +#define CKA_EXPONENT_1 0x00000126UL +#define CKA_EXPONENT_2 0x00000127UL +#define CKA_COEFFICIENT 0x00000128UL +#define CKA_PUBLIC_KEY_INFO 0x00000129UL +#define CKA_PRIME 0x00000130UL +#define CKA_SUBPRIME 0x00000131UL +#define CKA_BASE 0x00000132UL +#define CKA_PRIME_BITS 0x00000133UL +#define CKA_SUBPRIME_BITS 0x00000134UL +#define CKA_SUB_PRIME_BITS 0x00000134UL +#define CKA_VALUE_BITS 0x00000160UL +#define CKA_VALUE_LEN 0x00000161UL +#define CKA_EXTRACTABLE 0x00000162UL +#define CKA_LOCAL 0x00000163UL +#define CKA_NEVER_EXTRACTABLE 0x00000164UL +#define CKA_ALWAYS_SENSITIVE 0x00000165UL +#define CKA_KEY_GEN_MECHANISM 0x00000166UL +#define CKA_MODIFIABLE 0x00000170UL +#define CKA_COPYABLE 0x00000171UL +#define CKA_DESTROYABLE 0x00000172UL +#define CKA_EC_PARAMS 0x00000180UL +#define CKA_EC_POINT 0x00000181UL +#define CKA_ALWAYS_AUTHENTICATE 0x00000202UL +#define CKA_WRAP_WITH_TRUSTED 0x00000210UL +#define CKA_OTP_FORMAT 0x00000220UL +#define CKA_OTP_LENGTH 0x00000221UL +#define CKA_OTP_TIME_INTERVAL 0x00000222UL +#define CKA_OTP_USER_FRIENDLY_MODE 0x00000223UL +#define CKA_OTP_CHALLENGE_REQUIREMENT 0x00000224UL +#define CKA_OTP_TIME_REQUIREMENT 0x00000225UL +#define CKA_OTP_COUNTER_REQUIREMENT 0x00000226UL +#define CKA_OTP_PIN_REQUIREMENT 0x00000227UL +#define CKA_OTP_COUNTER 0x0000022EUL +#define CKA_OTP_TIME 0x0000022FUL +#define CKA_OTP_USER_IDENTIFIER 0x0000022AUL +#define CKA_OTP_SERVICE_IDENTIFIER 0x0000022BUL +#define CKA_OTP_SERVICE_LOGO 0x0000022CUL +#define CKA_OTP_SERVICE_LOGO_TYPE 0x0000022DUL +#define CKA_GOSTR3410_PARAMS 0x00000250UL +#define CKA_GOSTR3411_PARAMS 0x00000251UL +#define CKA_GOST28147_PARAMS 0x00000252UL +#define CKA_HW_FEATURE_TYPE 0x00000300UL +#define CKA_RESET_ON_INIT 0x00000301UL +#define CKA_HAS_RESET 0x00000302UL +#define CKA_PIXEL_X 0x00000400UL +#define CKA_PIXEL_Y 0x00000401UL +#define CKA_RESOLUTION 0x00000402UL +#define CKA_CHAR_ROWS 0x00000403UL +#define CKA_CHAR_COLUMNS 0x00000404UL +#define CKA_COLOR 0x00000405UL +#define CKA_BITS_PER_PIXEL 0x00000406UL +#define CKA_CHAR_SETS 0x00000480UL +#define CKA_ENCODING_METHODS 0x00000481UL +#define CKA_MIME_TYPES 0x00000482UL +#define CKA_MECHANISM_TYPE 0x00000500UL +#define CKA_REQUIRED_CMS_ATTRIBUTES 0x00000501UL +#define CKA_DEFAULT_CMS_ATTRIBUTES 0x00000502UL +#define CKA_SUPPORTED_CMS_ATTRIBUTES 0x00000503UL +#define CKA_PROFILE_ID 0x00000601UL +#define CKA_X2RATCHET_BAG 0x00000602UL +#define CKA_X2RATCHET_BAGSIZE 0x00000603UL +#define CKA_X2RATCHET_BOBS1STMSG 0x00000604UL +#define CKA_X2RATCHET_CKR 0x00000605UL +#define CKA_X2RATCHET_CKS 0x00000606UL +#define CKA_X2RATCHET_DHP 0x00000607UL +#define CKA_X2RATCHET_DHR 0x00000608UL +#define CKA_X2RATCHET_DHS 0x00000609UL +#define CKA_X2RATCHET_HKR 0x0000060AUL +#define CKA_X2RATCHET_HKS 0x0000060BUL +#define CKA_X2RATCHET_ISALICE 0x0000060CUL +#define CKA_X2RATCHET_NHKR 0x0000060DUL +#define CKA_X2RATCHET_NHKS 0x0000060EUL +#define CKA_X2RATCHET_NR 0x0000060FUL +#define CKA_X2RATCHET_NS 0x00000610UL +#define CKA_X2RATCHET_PNS 0x00000611UL +#define CKA_X2RATCHET_RK 0x00000612UL +#define CKA_VENDOR_DEFINED 0x80000000UL +/* Array attributes */ +#define CKA_WRAP_TEMPLATE 0x40000211UL +#define CKA_UNWRAP_TEMPLATE 0x40000212UL +#define CKA_DERIVE_TEMPLATE 0x40000213UL +#define CKA_ALLOWED_MECHANISMS 0x40000600UL +/* Deprecated */ +#ifdef PKCS11_DEPRECATED +#define CKA_ECDSA_PARAMS 0x00000180UL +#define CKA_SECONDARY_AUTH 0x00000200UL +#define CKA_AUTH_PIN_FLAGS 0x00000201UL +#endif + +/* CKC */ +#define CKC_X_509 0x00000000UL +#define CKC_X_509_ATTR_CERT 0x00000001UL +#define CKC_WTLS 0x00000002UL +#define CKC_VENDOR_DEFINED 0x80000000UL + +/* CKD */ +#define CKD_NULL 0x00000001UL +#define CKD_SHA1_KDF 0x00000002UL +#define CKD_SHA1_KDF_ASN1 0x00000003UL +#define CKD_SHA1_KDF_CONCATENATE 0x00000004UL +#define CKD_SHA224_KDF 0x00000005UL +#define CKD_SHA256_KDF 0x00000006UL +#define CKD_SHA384_KDF 0x00000007UL +#define CKD_SHA512_KDF 0x00000008UL +#define CKD_CPDIVERSIFY_KDF 0x00000009UL +#define CKD_SHA3_224_KDF 0x0000000AUL +#define CKD_SHA3_256_KDF 0x0000000BUL +#define CKD_SHA3_384_KDF 0x0000000CUL +#define CKD_SHA3_512_KDF 0x0000000DUL +#define CKD_SHA1_KDF_SP800 0x0000000EUL +#define CKD_SHA224_KDF_SP800 0x0000000FUL +#define CKD_SHA256_KDF_SP800 0x00000010UL +#define CKD_SHA384_KDF_SP800 0x00000011UL +#define CKD_SHA512_KDF_SP800 0x00000012UL +#define CKD_SHA3_224_KDF_SP800 0x00000013UL +#define CKD_SHA3_256_KDF_SP800 0x00000014UL +#define CKD_SHA3_384_KDF_SP800 0x00000015UL +#define CKD_SHA3_512_KDF_SP800 0x00000016UL +#define CKD_BLAKE2B_160_KDF 0x00000017UL +#define CKD_BLAKE2B_256_KDF 0x00000018UL +#define CKD_BLAKE2B_384_KDF 0x00000019UL +#define CKD_BLAKE2B_512_KDF 0x0000001AUL + +/* CFK (array attributes) */ +#define CKF_ARRAY_ATTRIBUTE 0x40000000UL + +/* CKF (capabilities) */ +#define CKF_LIBRARY_CANT_CREATE_OS_THREADS 0x00000001UL +#define CKF_OS_LOCKING_OK 0x00000002UL + +/* CKF (HKDF) */ +#define CKF_HKDF_SALT_NULL 0x00000001UL +#define CKF_HKDF_SALT_DATA 0x00000002UL +#define CKF_HKDF_SALT_KEY 0x00000004UL + +/* CKF (interface) */ +#define CKF_INTERFACE_FORK_SAFE 0x00000001UL + +/* CKF (mechanism) */ +#define CKF_HW 0x00000001UL +#define CKF_MESSAGE_ENCRYPT 0x00000002UL +#define CKF_MESSAGE_DECRYPT 0x00000004UL +#define CKF_MESSAGE_SIGN 0x00000008UL +#define CKF_MESSAGE_VERIFY 0x00000010UL +#define CKF_MULTI_MESSAGE 0x00000020UL +#define CKF_MULTI_MESSGE 0x00000020UL +#define CKF_FIND_OBJECTS 0x00000040UL +#define CKF_ENCRYPT 0x00000100UL +#define CKF_DECRYPT 0x00000200UL +#define CKF_DIGEST 0x00000400UL +#define CKF_SIGN 0x00000800UL +#define CKF_SIGN_RECOVER 0x00001000UL +#define CKF_VERIFY 0x00002000UL +#define CKF_VERIFY_RECOVER 0x00004000UL +#define CKF_GENERATE 0x00008000UL +#define CKF_GENERATE_KEY_PAIR 0x00010000UL +#define CKF_WRAP 0x00020000UL +#define CKF_UNWRAP 0x00040000UL +#define CKF_DERIVE 0x00080000UL +#define CKF_EC_F_P 0x00100000UL +#define CKF_EC_F_2M 0x00200000UL +#define CKF_EC_ECPARAMETERS 0x00400000UL +#define CKF_EC_OID 0x00800000UL +#define CKF_EC_UNCOMPRESS 0x01000000UL +#define CKF_EC_COMPRESS 0x02000000UL +#define CKF_EC_CURVENAME 0x04000000UL +#define CKF_EXTENSION 0x80000000UL +/* Deprecated */ +#ifdef PKCS11_DEPRECATED +#define CKF_EC_NAMEDCURVE 0x00800000U +#endif + +/* CKF (message) */ +#define CKF_END_OF_MESSAGE 0x00000001UL + +/* CKF (OTP) */ +#define CKF_NEXT_OTP 0x00000001UL +#define CKF_EXCLUDE_TIME 0x00000002UL +#define CKF_EXCLUDE_COUNTER 0x00000004UL +#define CKF_EXCLUDE_CHALLENGE 0x00000008UL +#define CKF_EXCLUDE_PIN 0x00000010UL +#define CKF_USER_FRIENDLY_OTP 0x00000020UL + +/* CKF (paramters to functions) */ +#define CKF_DONT_BLOCK 1 + +/* CKF (session) */ +#define CKF_RW_SESSION 0x00000002UL +#define CKF_SERIAL_SESSION 0x00000004UL + +/* CFK (slot) */ +#define CKF_TOKEN_PRESENT 0x00000001UL +#define CKF_REMOVABLE_DEVICE 0x00000002UL +#define CKF_HW_SLOT 0x00000004UL + +/* CKF (token) */ +#define CKF_RNG 0x00000001UL +#define CKF_WRITE_PROTECTED 0x00000002UL +#define CKF_LOGIN_REQUIRED 0x00000004UL +#define CKF_USER_PIN_INITIALIZED 0x00000008UL +#define CKF_RESTORE_KEY_NOT_NEEDED 0x00000020UL +#define CKF_CLOCK_ON_TOKEN 0x00000040UL +#define CKF_PROTECTED_AUTHENTICATION_PATH 0x00000100UL +#define CKF_DUAL_CRYPTO_OPERATIONS 0x00000200UL +#define CKF_TOKEN_INITIALIZED 0x00000400UL +#define CKF_SECONDARY_AUTHENTICATION 0x00000800UL +#define CKF_USER_PIN_COUNT_LOW 0x00010000UL +#define CKF_USER_PIN_FINAL_TRY 0x00020000UL +#define CKF_USER_PIN_LOCKED 0x00040000UL +#define CKF_USER_PIN_TO_BE_CHANGED 0x00080000UL +#define CKF_SO_PIN_COUNT_LOW 0x00100000UL +#define CKF_SO_PIN_FINAL_TRY 0x00200000UL +#define CKF_SO_PIN_LOCKED 0x00400000UL +#define CKF_SO_PIN_TO_BE_CHANGED 0x00800000UL +#define CKF_ERROR_STATE 0x01000000UL + +/* CKG (GCM) */ +#define CKG_NO_GENERATE 0x00000000UL +#define CKG_GENERATE 0x00000001UL +#define CKG_GENERATE_COUNTER 0x00000002UL +#define CKG_GENERATE_RANDOM 0x00000003UL + +/* CKG (MFG) */ +#define CKG_MGF1_SHA1 0x00000001UL +#define CKG_MGF1_SHA256 0x00000002UL +#define CKG_MGF1_SHA384 0x00000003UL +#define CKG_MGF1_SHA512 0x00000004UL +#define CKG_MGF1_SHA224 0x00000005UL +#define CKG_MGF1_SHA3_224 0x00000006UL +#define CKG_MGF1_SHA3_256 0x00000007UL +#define CKG_MGF1_SHA3_384 0x00000008UL +#define CKG_MGF1_SHA3_512 0x00000009UL + +/* CKH */ +#define CKH_MONOTONIC_COUNTER 0x00000001UL +#define CKH_CLOCK 0x00000002UL +#define CKH_USER_INTERFACE 0x00000003UL +#define CKH_VENDOR_DEFINED 0x80000000UL + +/* CKK */ +#define CKK_RSA 0x00000000UL +#define CKK_DSA 0x00000001UL +#define CKK_DH 0x00000002UL +#define CKK_EC 0x00000003UL +#define CKK_X9_42_DH 0x00000004UL +#define CKK_KEA 0x00000005UL +#define CKK_GENERIC_SECRET 0x00000010UL +#define CKK_RC2 0x00000011UL +#define CKK_RC4 0x00000012UL +#define CKK_DES 0x00000013UL +#define CKK_DES2 0x00000014UL +#define CKK_DES3 0x00000015UL +#define CKK_CAST 0x00000016UL +#define CKK_CAST3 0x00000017UL +#define CKK_CAST128 0x00000018UL +#define CKK_RC5 0x00000019UL +#define CKK_IDEA 0x0000001AUL +#define CKK_SKIPJACK 0x0000001BUL +#define CKK_BATON 0x0000001CUL +#define CKK_JUNIPER 0x0000001DUL +#define CKK_CDMF 0x0000001EUL +#define CKK_AES 0x0000001FUL +#define CKK_BLOWFISH 0x00000020UL +#define CKK_TWOFISH 0x00000021UL +#define CKK_SECURID 0x00000022UL +#define CKK_HOTP 0x00000023UL +#define CKK_ACTI 0x00000024UL +#define CKK_CAMELLIA 0x00000025UL +#define CKK_ARIA 0x00000026UL +#define CKK_MD5_HMAC 0x00000027UL +#define CKK_SHA_1_HMAC 0x00000028UL +#define CKK_RIPEMD128_HMAC 0x00000029UL +#define CKK_RIPEMD160_HMAC 0x0000002AUL +#define CKK_SHA256_HMAC 0x0000002BUL +#define CKK_SHA384_HMAC 0x0000002CUL +#define CKK_SHA512_HMAC 0x0000002DUL +#define CKK_SHA224_HMAC 0x0000002EUL +#define CKK_SEED 0x0000002FUL +#define CKK_GOSTR3410 0x00000030UL +#define CKK_GOSTR3411 0x00000031UL +#define CKK_GOST28147 0x00000032UL +#define CKK_CHACHA20 0x00000033UL +#define CKK_POLY1305 0x00000034UL +#define CKK_AES_XTS 0x00000035UL +#define CKK_SHA3_224_HMAC 0x00000036UL +#define CKK_SHA3_256_HMAC 0x00000037UL +#define CKK_SHA3_384_HMAC 0x00000038UL +#define CKK_SHA3_512_HMAC 0x00000039UL +#define CKK_BLAKE2B_160_HMAC 0x0000003AUL +#define CKK_BLAKE2B_256_HMAC 0x0000003BUL +#define CKK_BLAKE2B_384_HMAC 0x0000003CUL +#define CKK_BLAKE2B_512_HMAC 0x0000003DUL +#define CKK_SALSA20 0x0000003EUL +#define CKK_X2RATCHET 0x0000003FUL +#define CKK_EC_EDWARDS 0x00000040UL +#define CKK_EC_MONTGOMERY 0x00000041UL +#define CKK_HKDF 0x00000042UL +#define CKK_SHA512_224_HMAC 0x00000043UL +#define CKK_SHA512_256_HMAC 0x00000044UL +#define CKK_SHA512_T_HMAC 0x00000045UL +#define CKK_VENDOR_DEFINED 0x80000000UL +/* Deprecated */ +#ifdef PKCS11_DEPRECATED +#define CKK_ECDSA 0x00000003UL +#define CKK_CAST5 0x00000018UL +#endif + +/* CKM */ +#define CKM_RSA_PKCS_KEY_PAIR_GEN 0x00000000UL +#define CKM_RSA_PKCS 0x00000001UL +#define CKM_RSA_9796 0x00000002UL +#define CKM_RSA_X_509 0x00000003UL +#define CKM_MD2_RSA_PKCS 0x00000004UL +#define CKM_MD5_RSA_PKCS 0x00000005UL +#define CKM_SHA1_RSA_PKCS 0x00000006UL +#define CKM_RIPEMD128_RSA_PKCS 0x00000007UL +#define CKM_RIPEMD160_RSA_PKCS 0x00000008UL +#define CKM_RSA_PKCS_OAEP 0x00000009UL +#define CKM_RSA_X9_31_KEY_PAIR_GEN 0x0000000AUL +#define CKM_RSA_X9_31 0x0000000BUL +#define CKM_SHA1_RSA_X9_31 0x0000000CUL +#define CKM_RSA_PKCS_PSS 0x0000000DUL +#define CKM_SHA1_RSA_PKCS_PSS 0x0000000EUL +#define CKM_DSA_KEY_PAIR_GEN 0x00000010UL +#define CKM_DSA 0x00000011UL +#define CKM_DSA_SHA1 0x00000012UL +#define CKM_DSA_SHA224 0x00000013UL +#define CKM_DSA_SHA256 0x00000014UL +#define CKM_DSA_SHA384 0x00000015UL +#define CKM_DSA_SHA512 0x00000016UL +#define CKM_DSA_SHA3_224 0x00000018UL +#define CKM_DSA_SHA3_256 0x00000019UL +#define CKM_DSA_SHA3_384 0x0000001AUL +#define CKM_DSA_SHA3_512 0x0000001BUL +#define CKM_DH_PKCS_KEY_PAIR_GEN 0x00000020UL +#define CKM_DH_PKCS_DERIVE 0x00000021UL +#define CKM_X9_42_DH_KEY_PAIR_GEN 0x00000030UL +#define CKM_X9_42_DH_DERIVE 0x00000031UL +#define CKM_X9_42_DH_HYBRID_DERIVE 0x00000032UL +#define CKM_X9_42_MQV_DERIVE 0x00000033UL +#define CKM_SHA256_RSA_PKCS 0x00000040UL +#define CKM_SHA384_RSA_PKCS 0x00000041UL +#define CKM_SHA512_RSA_PKCS 0x00000042UL +#define CKM_SHA256_RSA_PKCS_PSS 0x00000043UL +#define CKM_SHA384_RSA_PKCS_PSS 0x00000044UL +#define CKM_SHA512_RSA_PKCS_PSS 0x00000045UL +#define CKM_SHA224_RSA_PKCS 0x00000046UL +#define CKM_SHA224_RSA_PKCS_PSS 0x00000047UL +#define CKM_SHA512_224 0x00000048UL +#define CKM_SHA512_224_HMAC 0x00000049UL +#define CKM_SHA512_224_HMAC_GENERAL 0x0000004AUL +#define CKM_SHA512_224_KEY_DERIVATION 0x0000004BUL +#define CKM_SHA512_256 0x0000004CUL +#define CKM_SHA512_256_HMAC 0x0000004DUL +#define CKM_SHA512_256_HMAC_GENERAL 0x0000004EUL +#define CKM_SHA512_256_KEY_DERIVATION 0x0000004FUL +#define CKM_SHA512_T 0x00000050UL +#define CKM_SHA512_T_HMAC 0x00000051UL +#define CKM_SHA512_T_HMAC_GENERAL 0x00000052UL +#define CKM_SHA512_T_KEY_DERIVATION 0x00000053UL +#define CKM_SHA3_256_RSA_PKCS 0x00000060UL +#define CKM_SHA3_384_RSA_PKCS 0x00000061UL +#define CKM_SHA3_512_RSA_PKCS 0x00000062UL +#define CKM_SHA3_256_RSA_PKCS_PSS 0x00000063UL +#define CKM_SHA3_384_RSA_PKCS_PSS 0x00000064UL +#define CKM_SHA3_512_RSA_PKCS_PSS 0x00000065UL +#define CKM_SHA3_224_RSA_PKCS 0x00000066UL +#define CKM_SHA3_224_RSA_PKCS_PSS 0x00000067UL +#define CKM_RC2_KEY_GEN 0x00000100UL +#define CKM_RC2_ECB 0x00000101UL +#define CKM_RC2_CBC 0x00000102UL +#define CKM_RC2_MAC 0x00000103UL +#define CKM_RC2_MAC_GENERAL 0x00000104UL +#define CKM_RC2_CBC_PAD 0x00000105UL +#define CKM_RC4_KEY_GEN 0x00000110UL +#define CKM_RC4 0x00000111UL +#define CKM_DES_KEY_GEN 0x00000120UL +#define CKM_DES_ECB 0x00000121UL +#define CKM_DES_CBC 0x00000122UL +#define CKM_DES_MAC 0x00000123UL +#define CKM_DES_MAC_GENERAL 0x00000124UL +#define CKM_DES_CBC_PAD 0x00000125UL +#define CKM_DES2_KEY_GEN 0x00000130UL +#define CKM_DES3_KEY_GEN 0x00000131UL +#define CKM_DES3_ECB 0x00000132UL +#define CKM_DES3_CBC 0x00000133UL +#define CKM_DES3_MAC 0x00000134UL +#define CKM_DES3_MAC_GENERAL 0x00000135UL +#define CKM_DES3_CBC_PAD 0x00000136UL +#define CKM_DES3_CMAC_GENERAL 0x00000137UL +#define CKM_DES3_CMAC 0x00000138UL +#define CKM_CDMF_KEY_GEN 0x00000140UL +#define CKM_CDMF_ECB 0x00000141UL +#define CKM_CDMF_CBC 0x00000142UL +#define CKM_CDMF_MAC 0x00000143UL +#define CKM_CDMF_MAC_GENERAL 0x00000144UL +#define CKM_CDMF_CBC_PAD 0x00000145UL +#define CKM_DES_OFB64 0x00000150UL +#define CKM_DES_OFB8 0x00000151UL +#define CKM_DES_CFB64 0x00000152UL +#define CKM_DES_CFB8 0x00000153UL +#define CKM_MD2 0x00000200UL +#define CKM_MD2_HMAC 0x00000201UL +#define CKM_MD2_HMAC_GENERAL 0x00000202UL +#define CKM_MD5 0x00000210UL +#define CKM_MD5_HMAC 0x00000211UL +#define CKM_MD5_HMAC_GENERAL 0x00000212UL +#define CKM_SHA_1 0x00000220UL +#define CKM_SHA_1_HMAC 0x00000221UL +#define CKM_SHA_1_HMAC_GENERAL 0x00000222UL +#define CKM_RIPEMD128 0x00000230UL +#define CKM_RIPEMD128_HMAC 0x00000231UL +#define CKM_RIPEMD128_HMAC_GENERAL 0x00000232UL +#define CKM_RIPEMD160 0x00000240UL +#define CKM_RIPEMD160_HMAC 0x00000241UL +#define CKM_RIPEMD160_HMAC_GENERAL 0x00000242UL +#define CKM_SHA256 0x00000250UL +#define CKM_SHA256_HMAC 0x00000251UL +#define CKM_SHA256_HMAC_GENERAL 0x00000252UL +#define CKM_SHA224 0x00000255UL +#define CKM_SHA224_HMAC 0x00000256UL +#define CKM_SHA224_HMAC_GENERAL 0x00000257UL +#define CKM_SHA384 0x00000260UL +#define CKM_SHA384_HMAC 0x00000261UL +#define CKM_SHA384_HMAC_GENERAL 0x00000262UL +#define CKM_SHA512 0x00000270UL +#define CKM_SHA512_HMAC 0x00000271UL +#define CKM_SHA512_HMAC_GENERAL 0x00000272UL +#define CKM_SECURID_KEY_GEN 0x00000280UL +#define CKM_SECURID 0x00000282UL +#define CKM_HOTP_KEY_GEN 0x00000290UL +#define CKM_HOTP 0x00000291UL +#define CKM_ACTI 0x000002A0UL +#define CKM_ACTI_KEY_GEN 0x000002A1UL +#define CKM_SHA3_256 0x000002B0UL +#define CKM_SHA3_256_HMAC 0x000002B1UL +#define CKM_SHA3_256_HMAC_GENERAL 0x000002B2UL +#define CKM_SHA3_256_KEY_GEN 0x000002B3UL +#define CKM_SHA3_224 0x000002B5UL +#define CKM_SHA3_224_HMAC 0x000002B6UL +#define CKM_SHA3_224_HMAC_GENERAL 0x000002B7UL +#define CKM_SHA3_224_KEY_GEN 0x000002B8UL +#define CKM_SHA3_384 0x000002C0UL +#define CKM_SHA3_384_HMAC 0x000002C1UL +#define CKM_SHA3_384_HMAC_GENERAL 0x000002C2UL +#define CKM_SHA3_384_KEY_GEN 0x000002C3UL +#define CKM_SHA3_512 0x000002D0UL +#define CKM_SHA3_512_HMAC 0x000002D1UL +#define CKM_SHA3_512_HMAC_GENERAL 0x000002D2UL +#define CKM_SHA3_512_KEY_GEN 0x000002D3UL +#define CKM_CAST_KEY_GEN 0x00000300UL +#define CKM_CAST_ECB 0x00000301UL +#define CKM_CAST_CBC 0x00000302UL +#define CKM_CAST_MAC 0x00000303UL +#define CKM_CAST_MAC_GENERAL 0x00000304UL +#define CKM_CAST_CBC_PAD 0x00000305UL +#define CKM_CAST3_KEY_GEN 0x00000310UL +#define CKM_CAST3_ECB 0x00000311UL +#define CKM_CAST3_CBC 0x00000312UL +#define CKM_CAST3_MAC 0x00000313UL +#define CKM_CAST3_MAC_GENERAL 0x00000314UL +#define CKM_CAST3_CBC_PAD 0x00000315UL +#define CKM_CAST128_KEY_GEN 0x00000320UL +#define CKM_CAST5_ECB 0x00000321UL +#define CKM_CAST128_ECB 0x00000321UL +#define CKM_CAST128_MAC 0x00000323UL +#define CKM_CAST128_CBC 0x00000322UL +#define CKM_CAST128_MAC_GENERAL 0x00000324UL +#define CKM_CAST128_CBC_PAD 0x00000325UL +#define CKM_RC5_KEY_GEN 0x00000330UL +#define CKM_RC5_ECB 0x00000331UL +#define CKM_RC5_CBC 0x00000332UL +#define CKM_RC5_MAC 0x00000333UL +#define CKM_RC5_MAC_GENERAL 0x00000334UL +#define CKM_RC5_CBC_PAD 0x00000335UL +#define CKM_IDEA_KEY_GEN 0x00000340UL +#define CKM_IDEA_ECB 0x00000341UL +#define CKM_IDEA_CBC 0x00000342UL +#define CKM_IDEA_MAC 0x00000343UL +#define CKM_IDEA_MAC_GENERAL 0x00000344UL +#define CKM_IDEA_CBC_PAD 0x00000345UL +#define CKM_GENERIC_SECRET_KEY_GEN 0x00000350UL +#define CKM_CONCATENATE_BASE_AND_KEY 0x00000360UL +#define CKM_CONCATENATE_BASE_AND_DATA 0x00000362UL +#define CKM_CONCATENATE_DATA_AND_BASE 0x00000363UL +#define CKM_XOR_BASE_AND_DATA 0x00000364UL +#define CKM_EXTRACT_KEY_FROM_KEY 0x00000365UL +#define CKM_SSL3_PRE_MASTER_KEY_GEN 0x00000370UL +#define CKM_SSL3_MASTER_KEY_DERIVE 0x00000371UL +#define CKM_SSL3_KEY_AND_MAC_DERIVE 0x00000372UL +#define CKM_SSL3_MASTER_KEY_DERIVE_DH 0x00000373UL +#define CKM_TLS_PRE_MASTER_KEY_GEN 0x00000374UL +#define CKM_TLS_MASTER_KEY_DERIVE 0x00000375UL +#define CKM_TLS_KEY_AND_MAC_DERIVE 0x00000376UL +#define CKM_TLS_MASTER_KEY_DERIVE_DH 0x00000377UL +#define CKM_TLS_PRF 0x00000378UL +#define CKM_SSL3_MD5_MAC 0x00000380UL +#define CKM_SSL3_SHA1_MAC 0x00000381UL +#define CKM_MD5_KEY_DERIVATION 0x00000390UL +#define CKM_MD2_KEY_DERIVATION 0x00000391UL +#define CKM_SHA1_KEY_DERIVATION 0x00000392UL +#define CKM_SHA256_KEY_DERIVATION 0x00000393UL +#define CKM_SHA384_KEY_DERIVATION 0x00000394UL +#define CKM_SHA512_KEY_DERIVATION 0x00000395UL +#define CKM_SHA224_KEY_DERIVATION 0x00000396UL +#define CKM_SHA3_256_KEY_DERIVATION 0x00000397UL +#define CKM_SHA3_256_KEY_DERIVE 0x00000397UL +#define CKM_SHA3_224_KEY_DERIVATION 0x00000398UL +#define CKM_SHA3_224_KEY_DERIVE 0x00000398UL +#define CKM_SHA3_384_KEY_DERIVATION 0x00000399UL +#define CKM_SHA3_384_KEY_DERIVE 0x00000399UL +#define CKM_SHA3_512_KEY_DERIVATION 0x0000039AUL +#define CKM_SHA3_512_KEY_DERIVE 0x0000039AUL +#define CKM_SHAKE_128_KEY_DERIVATION 0x0000039BUL +#define CKM_SHAKE_128_KEY_DERIVE 0x0000039BUL +#define CKM_SHAKE_256_KEY_DERIVATION 0x0000039CUL +#define CKM_SHAKE_256_KEY_DERIVE 0x0000039CUL +#define CKM_PBE_MD2_DES_CBC 0x000003A0UL +#define CKM_PBE_MD5_DES_CBC 0x000003A1UL +#define CKM_PBE_MD5_CAST_CBC 0x000003A2UL +#define CKM_PBE_MD5_CAST3_CBC 0x000003A3UL +#define CKM_PBE_MD5_CAST128_CBC 0x000003A4UL +#define CKM_PBE_SHA1_CAST128_CBC 0x000003A5UL +#define CKM_PBE_SHA1_RC4_128 0x000003A6UL +#define CKM_PBE_SHA1_RC4_40 0x000003A7UL +#define CKM_PBE_SHA1_DES3_EDE_CBC 0x000003A8UL +#define CKM_PBE_SHA1_DES2_EDE_CBC 0x000003A9UL +#define CKM_PBE_SHA1_RC2_128_CBC 0x000003AAUL +#define CKM_PBE_SHA1_RC2_40_CBC 0x000003ABUL +#define CKM_PKCS5_PBKD2 0x000003B0UL +#define CKM_PBA_SHA1_WITH_SHA1_HMAC 0x000003C0UL +#define CKM_WTLS_PRE_MASTER_KEY_GEN 0x000003D0UL +#define CKM_WTLS_MASTER_KEY_DERIVE 0x000003D1UL +#define CKM_WTLS_MASTER_KEY_DERIVE_DH_ECC 0x000003D2UL +#define CKM_WTLS_PRF 0x000003D3UL +#define CKM_WTLS_SERVER_KEY_AND_MAC_DERIVE 0x000003D4UL +#define CKM_WTLS_CLIENT_KEY_AND_MAC_DERIVE 0x000003D5UL +#define CKM_TLS10_MAC_SERVER 0x000003D6UL +#define CKM_TLS10_MAC_CLIENT 0x000003D7UL +#define CKM_TLS12_MAC 0x000003D8UL +#define CKM_TLS12_KDF 0x000003D9UL +#define CKM_TLS12_MASTER_KEY_DERIVE 0x000003E0UL +#define CKM_TLS12_KEY_AND_MAC_DERIVE 0x000003E1UL +#define CKM_TLS12_MASTER_KEY_DERIVE_DH 0x000003E2UL +#define CKM_TLS12_KEY_SAFE_DERIVE 0x000003E3UL +#define CKM_TLS_MAC 0x000003E4UL +#define CKM_TLS_KDF 0x000003E5UL +#define CKM_KEY_WRAP_LYNKS 0x00000400UL +#define CKM_KEY_WRAP_SET_OAEP 0x00000401UL +#define CKM_CMS_SIG 0x00000500UL +#define CKM_KIP_DERIVE 0x00000510UL +#define CKM_KIP_WRAP 0x00000511UL +#define CKM_KIP_MAC 0x00000512UL +#define CKM_CAMELLIA_KEY_GEN 0x00000550UL +#define CKM_CAMELLIA_ECB 0x00000551UL +#define CKM_CAMELLIA_CBC 0x00000552UL +#define CKM_CAMELLIA_MAC 0x00000553UL +#define CKM_CAMELLIA_MAC_GENERAL 0x00000554UL +#define CKM_CAMELLIA_CBC_PAD 0x00000555UL +#define CKM_CAMELLIA_ECB_ENCRYPT_DATA 0x00000556UL +#define CKM_CAMELLIA_CBC_ENCRYPT_DATA 0x00000557UL +#define CKM_CAMELLIA_CTR 0x00000558UL +#define CKM_ARIA_KEY_GEN 0x00000560UL +#define CKM_ARIA_ECB 0x00000561UL +#define CKM_ARIA_CBC 0x00000562UL +#define CKM_ARIA_MAC 0x00000563UL +#define CKM_ARIA_MAC_GENERAL 0x00000564UL +#define CKM_ARIA_CBC_PAD 0x00000565UL +#define CKM_ARIA_ECB_ENCRYPT_DATA 0x00000566UL +#define CKM_ARIA_CBC_ENCRYPT_DATA 0x00000567UL +#define CKM_SEED_KEY_GEN 0x00000650UL +#define CKM_SEED_ECB 0x00000651UL +#define CKM_SEED_CBC 0x00000652UL +#define CKM_SEED_MAC 0x00000653UL +#define CKM_SEED_MAC_GENERAL 0x00000654UL +#define CKM_SEED_CBC_PAD 0x00000655UL +#define CKM_SEED_ECB_ENCRYPT_DATA 0x00000656UL +#define CKM_SEED_CBC_ENCRYPT_DATA 0x00000657UL +#define CKM_SKIPJACK_KEY_GEN 0x00001000UL +#define CKM_SKIPJACK_ECB64 0x00001001UL +#define CKM_SKIPJACK_CBC64 0x00001002UL +#define CKM_SKIPJACK_OFB64 0x00001003UL +#define CKM_SKIPJACK_CFB64 0x00001004UL +#define CKM_SKIPJACK_CFB32 0x00001005UL +#define CKM_SKIPJACK_CFB16 0x00001006UL +#define CKM_SKIPJACK_CFB8 0x00001007UL +#define CKM_SKIPJACK_WRAP 0x00001008UL +#define CKM_SKIPJACK_PRIVATE_WRAP 0x00001009UL +#define CKM_SKIPJACK_RELAYX 0x0000100AUL +#define CKM_KEA_KEY_PAIR_GEN 0x00001010UL +#define CKM_KEA_KEY_DERIVE 0x00001011UL +#define CKM_KEA_DERIVE 0x00001012UL +#define CKM_FORTEZZA_TIMESTAMP 0x00001020UL +#define CKM_BATON_KEY_GEN 0x00001030UL +#define CKM_BATON_ECB128 0x00001031UL +#define CKM_BATON_ECB96 0x00001032UL +#define CKM_BATON_CBC128 0x00001033UL +#define CKM_BATON_COUNTER 0x00001034UL +#define CKM_BATON_SHUFFLE 0x00001035UL +#define CKM_BATON_WRAP 0x00001036UL +#define CKM_EC_KEY_PAIR_GEN 0x00001040UL +#define CKM_ECDSA 0x00001041UL +#define CKM_ECDSA_SHA1 0x00001042UL +#define CKM_ECDSA_SHA224 0x00001043UL +#define CKM_ECDSA_SHA256 0x00001044UL +#define CKM_ECDSA_SHA384 0x00001045UL +#define CKM_ECDSA_SHA512 0x00001046UL +#define CKM_EC_KEY_PAIR_GEN_W_EXTRA_BITS 0x0000140BUL +#define CKM_ECDH1_DERIVE 0x00001050UL +#define CKM_ECDH1_COFACTOR_DERIVE 0x00001051UL +#define CKM_ECMQV_DERIVE 0x00001052UL +#define CKM_ECDH_AES_KEY_WRAP 0x00001053UL +#define CKM_RSA_AES_KEY_WRAP 0x00001054UL +#define CKM_JUNIPER_KEY_GEN 0x00001060UL +#define CKM_JUNIPER_ECB128 0x00001061UL +#define CKM_JUNIPER_CBC128 0x00001062UL +#define CKM_JUNIPER_COUNTER 0x00001063UL +#define CKM_JUNIPER_SHUFFLE 0x00001064UL +#define CKM_JUNIPER_WRAP 0x00001065UL +#define CKM_FASTHASH 0x00001070UL +#define CKM_AES_XTS 0x00001071UL +#define CKM_AES_XTS_KEY_GEN 0x00001072UL +#define CKM_AES_KEY_GEN 0x00001080UL +#define CKM_AES_ECB 0x00001081UL +#define CKM_AES_CBC 0x00001082UL +#define CKM_AES_MAC 0x00001083UL +#define CKM_AES_MAC_GENERAL 0x00001084UL +#define CKM_AES_CBC_PAD 0x00001085UL +#define CKM_AES_CTR 0x00001086UL +#define CKM_AES_GCM 0x00001087UL +#define CKM_AES_CCM 0x00001088UL +#define CKM_AES_CTS 0x00001089UL +#define CKM_AES_CMAC 0x0000108AUL +#define CKM_AES_CMAC_GENERAL 0x0000108BUL +#define CKM_AES_XCBC_MAC 0x0000108CUL +#define CKM_AES_XCBC_MAC_96 0x0000108DUL +#define CKM_AES_GMAC 0x0000108EUL +#define CKM_BLOWFISH_KEY_GEN 0x00001090UL +#define CKM_BLOWFISH_CBC 0x00001091UL +#define CKM_TWOFISH_KEY_GEN 0x00001092UL +#define CKM_TWOFISH_CBC 0x00001093UL +#define CKM_BLOWFISH_CBC_PAD 0x00001094UL +#define CKM_TWOFISH_CBC_PAD 0x00001095UL +#define CKM_DES_ECB_ENCRYPT_DATA 0x00001100UL +#define CKM_DES_CBC_ENCRYPT_DATA 0x00001101UL +#define CKM_DES3_ECB_ENCRYPT_DATA 0x00001102UL +#define CKM_DES3_CBC_ENCRYPT_DATA 0x00001103UL +#define CKM_AES_ECB_ENCRYPT_DATA 0x00001104UL +#define CKM_AES_CBC_ENCRYPT_DATA 0x00001105UL +#define CKM_GOSTR3410_KEY_PAIR_GEN 0x00001200UL +#define CKM_GOSTR3410 0x00001201UL +#define CKM_GOSTR3410_WITH_GOSTR3411 0x00001202UL +#define CKM_GOSTR3410_KEY_WRAP 0x00001203UL +#define CKM_GOSTR3410_DERIVE 0x00001204UL +#define CKM_GOSTR3411 0x00001210UL +#define CKM_GOSTR3411_HMAC 0x00001211UL +#define CKM_GOST28147_KEY_GEN 0x00001220UL +#define CKM_GOST28147_ECB 0x00001221UL +#define CKM_GOST28147 0x00001222UL +#define CKM_GOST28147_MAC 0x00001223UL +#define CKM_GOST28147_KEY_WRAP 0x00001224UL +#define CKM_CHACHA20_KEY_GEN 0x00001225UL +#define CKM_CHACHA20 0x00001226UL +#define CKM_POLY1305_KEY_GEN 0x00001227UL +#define CKM_POLY1305 0x00001228UL +#define CKM_DSA_PARAMETER_GEN 0x00002000UL +#define CKM_DH_PKCS_PARAMETER_GEN 0x00002001UL +#define CKM_X9_42_DH_PARAMETER_GEN 0x00002002UL +#define CKM_DSA_PROBABILISTIC_PARAMETER_GEN 0x00002003UL +#define CKM_DSA_PROBABLISTIC_PARAMETER_GEN 0x00002003UL +#define CKM_DSA_SHAWE_TAYLOR_PARAMETER_GEN 0x00002004UL +#define CKM_DSA_FIPS_G_GEN 0x00002005UL +#define CKM_AES_OFB 0x00002104UL +#define CKM_AES_CFB64 0x00002105UL +#define CKM_AES_CFB8 0x00002106UL +#define CKM_AES_CFB128 0x00002107UL +#define CKM_AES_CFB1 0x00002108UL +#define CKM_AES_KEY_WRAP 0x00002109UL +#define CKM_AES_KEY_WRAP_PAD 0x0000210AUL +#define CKM_AES_KEY_WRAP_KWP 0x0000210BUL +#define CKM_RSA_PKCS_TPM_1_1 0x00004001UL +#define CKM_RSA_PKCS_OAEP_TPM_1_1 0x00004002UL +#define CKM_SHA_1_KEY_GEN 0x00004003UL +#define CKM_SHA224_KEY_GEN 0x00004004UL +#define CKM_SHA256_KEY_GEN 0x00004005UL +#define CKM_SHA384_KEY_GEN 0x00004006UL +#define CKM_SHA512_KEY_GEN 0x00004007UL +#define CKM_SHA512_224_KEY_GEN 0x00004008UL +#define CKM_SHA512_256_KEY_GEN 0x00004009UL +#define CKM_SHA512_T_KEY_GEN 0x0000400AUL +#define CKM_NULL 0x0000400BUL +#define CKM_BLAKE2B_160 0x0000400CUL +#define CKM_BLAKE2B_160_HMAC 0x0000400DUL +#define CKM_BLAKE2B_160_HMAC_GENERAL 0x0000400EUL +#define CKM_BLAKE2B_160_KEY_DERIVE 0x0000400FUL +#define CKM_BLAKE2B_160_KEY_GEN 0x00004010UL +#define CKM_BLAKE2B_256 0x00004011UL +#define CKM_BLAKE2B_256_HMAC 0x00004012UL +#define CKM_BLAKE2B_256_HMAC_GENERAL 0x00004013UL +#define CKM_BLAKE2B_256_KEY_DERIVE 0x00004014UL +#define CKM_BLAKE2B_256_KEY_GEN 0x00004015UL +#define CKM_BLAKE2B_384 0x00004016UL +#define CKM_BLAKE2B_384_HMAC 0x00004017UL +#define CKM_BLAKE2B_384_HMAC_GENERAL 0x00004018UL +#define CKM_BLAKE2B_384_KEY_DERIVE 0x00004019UL +#define CKM_BLAKE2B_384_KEY_GEN 0x0000401AUL +#define CKM_BLAKE2B_512 0x0000401BUL +#define CKM_BLAKE2B_512_HMAC 0x0000401CUL +#define CKM_BLAKE2B_512_HMAC_GENERAL 0x0000401DUL +#define CKM_BLAKE2B_512_KEY_DERIVE 0x0000401EUL +#define CKM_BLAKE2B_512_KEY_GEN 0x0000401FUL +#define CKM_SALSA20 0x00004020UL +#define CKM_CHACHA20_POLY1305 0x00004021UL +#define CKM_SALSA20_POLY1305 0x00004022UL +#define CKM_X3DH_INITIALIZE 0x00004023UL +#define CKM_X3DH_RESPOND 0x00004024UL +#define CKM_X2RATCHET_INITIALIZE 0x00004025UL +#define CKM_X2RATCHET_RESPOND 0x00004026UL +#define CKM_X2RATCHET_ENCRYPT 0x00004027UL +#define CKM_X2RATCHET_DECRYPT 0x00004028UL +#define CKM_XEDDSA 0x00004029UL +#define CKM_HKDF_DERIVE 0x0000402AUL +#define CKM_HKDF_DATA 0x0000402BUL +#define CKM_HKDF_KEY_GEN 0x0000402CUL +#define CKM_SALSA20_KEY_GEN 0x0000402DUL +#define CKM_ECDSA_SHA3_224 0x00001047UL +#define CKM_ECDSA_SHA3_256 0x00001048UL +#define CKM_ECDSA_SHA3_384 0x00001049UL +#define CKM_ECDSA_SHA3_512 0x0000104AUL +#define CKM_EC_EDWARDS_KEY_PAIR_GEN 0x00001055UL +#define CKM_EC_MONTGOMERY_KEY_PAIR_GEN 0x00001056UL +#define CKM_EDDSA 0x00001057UL +#define CKM_SP800_108_COUNTER_KDF 0x000003ACUL +#define CKM_SP800_108_FEEDBACK_KDF 0x000003ADUL +#define CKM_SP800_108_DOUBLE_PIPELINE_KDF 0x000003AEUL +#define CKM_VENDOR_DEFINED 0x80000000UL +/* Deprecated */ +#ifdef PKCS11_DEPRECATED +#define CKM_CAST5_KEY_GEN 0x00000320UL +#define CKM_CAST5_CBC 0x00000322UL +#define CKM_CAST5_MAC 0x00000323UL +#define CKM_CAST5_MAC_GENERAL 0x00000324UL +#define CKM_CAST5_CBC_PAD 0x00000325UL +#define CKM_PBE_MD5_CAST5_CBC 0x000003A4UL +#define CKM_PBE_SHA1_CAST5_CBC 0x000003A5UL +#define CKM_ECDSA_KEY_PAIR_GEN 0x00001040UL +#endif + +/* CKN */ +#define CKN_SURRENDER 0UL +#define CKN_OTP_CHANGED 1UL + +/* CKO */ +#define CKO_DATA 0x00000000UL +#define CKO_CERTIFICATE 0x00000001UL +#define CKO_PUBLIC_KEY 0x00000002UL +#define CKO_PRIVATE_KEY 0x00000003UL +#define CKO_SECRET_KEY 0x00000004UL +#define CKO_HW_FEATURE 0x00000005UL +#define CKO_DOMAIN_PARAMETERS 0x00000006UL +#define CKO_MECHANISM 0x00000007UL +#define CKO_OTP_KEY 0x00000008UL +#define CKO_PROFILE 0x00000009UL +#define CKO_VENDOR_DEFINED 0x80000000UL + +/* CKP (profile) */ +#define CKP_INVALID_ID 0x00000000UL +#define CKP_BASELINE_PROVIDER 0x00000001UL +#define CKP_EXTENDED_PROVIDER 0x00000002UL +#define CKP_AUTHENTICATION_TOKEN 0x00000003UL +#define CKP_PUBLIC_CERTIFICATES_TOKEN 0x00000004UL +#define CKP_VENDOR_DEFINED 0x80000000UL + +/* CKP (PBKD2) */ +#define CKP_PKCS5_PBKD2_HMAC_SHA1 0x00000001UL +#define CKP_PKCS5_PBKD2_HMAC_GOSTR3411 0x00000002UL +#define CKP_PKCS5_PBKD2_HMAC_SHA224 0x00000003UL +#define CKP_PKCS5_PBKD2_HMAC_SHA256 0x00000004UL +#define CKP_PKCS5_PBKD2_HMAC_SHA384 0x00000005UL +#define CKP_PKCS5_PBKD2_HMAC_SHA512 0x00000006UL +#define CKP_PKCS5_PBKD2_HMAC_SHA512_224 0x00000007UL +#define CKP_PKCS5_PBKD2_HMAC_SHA512_256 0x00000008UL + +/* CKR */ +#define CKR_OK 0x00000000UL +#define CKR_CANCEL 0x00000001UL +#define CKR_HOST_MEMORY 0x00000002UL +#define CKR_SLOT_ID_INVALID 0x00000003UL +#define CKR_GENERAL_ERROR 0x00000005UL +#define CKR_FUNCTION_FAILED 0x00000006UL +#define CKR_ARGUMENTS_BAD 0x00000007UL +#define CKR_NO_EVENT 0x00000008UL +#define CKR_NEED_TO_CREATE_THREADS 0x00000009UL +#define CKR_CANT_LOCK 0x0000000AUL +#define CKR_ATTRIBUTE_READ_ONLY 0x00000010UL +#define CKR_ATTRIBUTE_SENSITIVE 0x00000011UL +#define CKR_ATTRIBUTE_TYPE_INVALID 0x00000012UL +#define CKR_ATTRIBUTE_VALUE_INVALID 0x00000013UL +#define CKR_ACTION_PROHIBITED 0x0000001BUL +#define CKR_DATA_INVALID 0x00000020UL +#define CKR_DATA_LEN_RANGE 0x00000021UL +#define CKR_DEVICE_ERROR 0x00000030UL +#define CKR_DEVICE_MEMORY 0x00000031UL +#define CKR_DEVICE_REMOVED 0x00000032UL +#define CKR_ENCRYPTED_DATA_INVALID 0x00000040UL +#define CKR_ENCRYPTED_DATA_LEN_RANGE 0x00000041UL +#define CKR_AEAD_DECRYPT_FAILED 0x00000042UL +#define CKR_FUNCTION_CANCELED 0x00000050UL +#define CKR_FUNCTION_NOT_PARALLEL 0x00000051UL +#define CKR_FUNCTION_NOT_SUPPORTED 0x00000054UL +#define CKR_KEY_HANDLE_INVALID 0x00000060UL +#define CKR_KEY_SIZE_RANGE 0x00000062UL +#define CKR_KEY_TYPE_INCONSISTENT 0x00000063UL +#define CKR_KEY_NOT_NEEDED 0x00000064UL +#define CKR_KEY_CHANGED 0x00000065UL +#define CKR_KEY_NEEDED 0x00000066UL +#define CKR_KEY_INDIGESTIBLE 0x00000067UL +#define CKR_KEY_FUNCTION_NOT_PERMITTED 0x00000068UL +#define CKR_KEY_NOT_WRAPPABLE 0x00000069UL +#define CKR_KEY_UNEXTRACTABLE 0x0000006AUL +#define CKR_MECHANISM_INVALID 0x00000070UL +#define CKR_MECHANISM_PARAM_INVALID 0x00000071UL +#define CKR_OBJECT_HANDLE_INVALID 0x00000082UL +#define CKR_OPERATION_ACTIVE 0x00000090UL +#define CKR_OPERATION_NOT_INITIALIZED 0x00000091UL +#define CKR_PIN_INCORRECT 0x000000A0UL +#define CKR_PIN_INVALID 0x000000A1UL +#define CKR_PIN_LEN_RANGE 0x000000A2UL +#define CKR_PIN_EXPIRED 0x000000A3UL +#define CKR_PIN_LOCKED 0x000000A4UL +#define CKR_SESSION_CLOSED 0x000000B0UL +#define CKR_SESSION_COUNT 0x000000B1UL +#define CKR_SESSION_HANDLE_INVALID 0x000000B3UL +#define CKR_SESSION_PARALLEL_NOT_SUPPORTED 0x000000B4UL +#define CKR_SESSION_READ_ONLY 0x000000B5UL +#define CKR_SESSION_EXISTS 0x000000B6UL +#define CKR_SESSION_READ_ONLY_EXISTS 0x000000B7UL +#define CKR_SESSION_READ_WRITE_SO_EXISTS 0x000000B8UL +#define CKR_SIGNATURE_INVALID 0x000000C0UL +#define CKR_SIGNATURE_LEN_RANGE 0x000000C1UL +#define CKR_TEMPLATE_INCOMPLETE 0x000000D0UL +#define CKR_TEMPLATE_INCONSISTENT 0x000000D1UL +#define CKR_TOKEN_NOT_PRESENT 0x000000E0UL +#define CKR_TOKEN_NOT_RECOGNIZED 0x000000E1UL +#define CKR_TOKEN_WRITE_PROTECTED 0x000000E2UL +#define CKR_UNWRAPPING_KEY_HANDLE_INVALID 0x000000F0UL +#define CKR_UNWRAPPING_KEY_SIZE_RANGE 0x000000F1UL +#define CKR_UNWRAPPING_KEY_TYPE_INCONSISTENT 0x000000F2UL +#define CKR_USER_ALREADY_LOGGED_IN 0x00000100UL +#define CKR_USER_NOT_LOGGED_IN 0x00000101UL +#define CKR_USER_PIN_NOT_INITIALIZED 0x00000102UL +#define CKR_USER_TYPE_INVALID 0x00000103UL +#define CKR_USER_ANOTHER_ALREADY_LOGGED_IN 0x00000104UL +#define CKR_USER_TOO_MANY_TYPES 0x00000105UL +#define CKR_WRAPPED_KEY_INVALID 0x00000110UL +#define CKR_WRAPPED_KEY_LEN_RANGE 0x00000112UL +#define CKR_WRAPPING_KEY_HANDLE_INVALID 0x00000113UL +#define CKR_WRAPPING_KEY_SIZE_RANGE 0x00000114UL +#define CKR_WRAPPING_KEY_TYPE_INCONSISTENT 0x00000115UL +#define CKR_RANDOM_SEED_NOT_SUPPORTED 0x00000120UL +#define CKR_RANDOM_NO_RNG 0x00000121UL +#define CKR_DOMAIN_PARAMS_INVALID 0x00000130UL +#define CKR_CURVE_NOT_SUPPORTED 0x00000140UL +#define CKR_BUFFER_TOO_SMALL 0x00000150UL +#define CKR_SAVED_STATE_INVALID 0x00000160UL +#define CKR_INFORMATION_SENSITIVE 0x00000170UL +#define CKR_STATE_UNSAVEABLE 0x00000180UL +#define CKR_CRYPTOKI_NOT_INITIALIZED 0x00000190UL +#define CKR_CRYPTOKI_ALREADY_INITIALIZED 0x00000191UL +#define CKR_MUTEX_BAD 0x000001A0UL +#define CKR_MUTEX_NOT_LOCKED 0x000001A1UL +#define CKR_NEW_PIN_MODE 0x000001B0UL +#define CKR_NEXT_OTP 0x000001B1UL +#define CKR_EXCEEDED_MAX_ITERATIONS 0x000001B5UL +#define CKR_FIPS_SELF_TEST_FAILED 0x000001B6UL +#define CKR_LIBRARY_LOAD_FAILED 0x000001B7UL +#define CKR_PIN_TOO_WEAK 0x000001B8UL +#define CKR_PUBLIC_KEY_INVALID 0x000001B9UL +#define CKR_FUNCTION_REJECTED 0x00000200UL +#define CKR_TOKEN_RESOURCE_EXCEEDED 0x00000201UL +#define CKR_OPERATION_CANCEL_FAILED 0x00000202UL +#define CKR_VENDOR_DEFINED 0x80000000UL + + +/* CKS */ +#define CKS_RO_PUBLIC_SESSION 0UL +#define CKS_RO_USER_FUNCTIONS 1UL +#define CKS_RW_PUBLIC_SESSION 2UL +#define CKS_RW_USER_FUNCTIONS 3UL +#define CKS_RW_SO_FUNCTIONS 4UL + +/* CKU */ +#define CKU_SO 0UL +#define CKU_USER 1UL +#define CKU_CONTEXT_SPECIFIC 2UL + +/* CKZ (data) */ +#define CKZ_DATA_SPECIFIED 0x00000001UL + +/* CKZ (salt) */ +#define CKZ_SALT_SPECIFIED 0x00000001UL + +/* Sundry structures type definition in alphabetical order */ +#define STRUCTDEF(__name__) \ +struct __name__; \ +typedef struct __name__ __name__; \ +typedef struct __name__ * __name__ ## _PTR; \ +typedef struct __name__ ** __name__ ## _PTR_PTR; + +STRUCTDEF(CK_ATTRIBUTE); +STRUCTDEF(CK_C_INITIALIZE_ARGS); +STRUCTDEF(CK_DATE); +STRUCTDEF(CK_DERIVED_KEY); +STRUCTDEF(CK_FUNCTION_LIST); +STRUCTDEF(CK_FUNCTION_LIST_3_0); +STRUCTDEF(CK_INFO); +STRUCTDEF(CK_INTERFACE); +STRUCTDEF(CK_MECHANISM); +STRUCTDEF(CK_MECHANISM_INFO); +STRUCTDEF(CK_SESSION_INFO); +STRUCTDEF(CK_SLOT_INFO); +STRUCTDEF(CK_TOKEN_INFO); +STRUCTDEF(CK_VERSION); + +/* Function type definitions */ +typedef CK_RV (* CK_NOTIFY)(CK_SESSION_HANDLE, CK_NOTIFICATION, void *); +typedef CK_RV (* CK_CREATEMUTEX)(void **); +typedef CK_RV (* CK_DESTROYMUTEX)(void *); +typedef CK_RV (* CK_LOCKMUTEX)(void *); +typedef CK_RV (* CK_UNLOCKMUTEX)(void *); + +/* General Structure definitions */ +struct CK_ATTRIBUTE { + CK_ATTRIBUTE_TYPE type; + void * pValue; + CK_ULONG ulValueLen; +}; + +struct CK_C_INITIALIZE_ARGS { + CK_CREATEMUTEX CreateMutex; + CK_DESTROYMUTEX DestroyMutex; + CK_LOCKMUTEX LockMutex; + CK_UNLOCKMUTEX UnlockMutex; + CK_FLAGS flags; + void * pReserved; +}; + +struct CK_DATE{ + CK_CHAR year[4]; + CK_CHAR month[2]; + CK_CHAR day[2]; +}; + +struct CK_DERIVED_KEY +{ + CK_ATTRIBUTE * pTemplate; + CK_ULONG ulAttributeCount; + CK_OBJECT_HANDLE * phKey; +}; + +struct CK_VERSION { + CK_BYTE major; + CK_BYTE minor; +}; + +struct CK_INFO { + struct CK_VERSION cryptokiVersion; + CK_UTF8CHAR manufacturerID[32]; + CK_FLAGS flags; + CK_UTF8CHAR libraryDescription[32]; + struct CK_VERSION libraryVersion; +}; + +struct CK_INTERFACE { + CK_CHAR * pInterfaceName; + void * pFunctionList; + CK_FLAGS flags; +}; + +struct CK_MECHANISM { + CK_MECHANISM_TYPE mechanism; + void * pParameter; + CK_ULONG ulParameterLen; +}; + +struct CK_MECHANISM_INFO { + CK_ULONG ulMinKeySize; + CK_ULONG ulMaxKeySize; + CK_FLAGS flags; +}; + +struct CK_SESSION_INFO { + CK_SLOT_ID slotID; + CK_STATE state; + CK_FLAGS flags; + CK_ULONG ulDeviceError; +}; + +struct CK_SLOT_INFO { + CK_UTF8CHAR slotDescription[64]; + CK_UTF8CHAR manufacturerID[32]; + CK_FLAGS flags; + CK_VERSION hardwareVersion; + CK_VERSION firmwareVersion; +}; + +struct CK_TOKEN_INFO { + CK_UTF8CHAR label[32]; + CK_UTF8CHAR manufacturerID[32]; + CK_UTF8CHAR model[16]; + CK_CHAR serialNumber[16]; + CK_FLAGS flags; + CK_ULONG ulMaxSessionCount; + CK_ULONG ulSessionCount; + CK_ULONG ulMaxRwSessionCount; + CK_ULONG ulRwSessionCount; + CK_ULONG ulMaxPinLen; + CK_ULONG ulMinPinLen; + CK_ULONG ulTotalPublicMemory; + CK_ULONG ulFreePublicMemory; + CK_ULONG ulTotalPrivateMemory; + CK_ULONG ulFreePrivateMemory; + CK_VERSION hardwareVersion; + CK_VERSION firmwareVersion; + CK_CHAR utcTime[16]; +}; + +/* Param Structure definitions in alphabetical order */ +STRUCTDEF(CK_AES_CBC_ENCRYPT_DATA_PARAMS); +STRUCTDEF(CK_AES_CCM_PARAMS); +STRUCTDEF(CK_AES_CTR_PARAMS); +STRUCTDEF(CK_AES_GCM_PARAMS); +STRUCTDEF(CK_ARIA_CBC_ENCRYPT_DATA_PARAMS); +STRUCTDEF(CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS); +STRUCTDEF(CK_CAMELLIA_CTR_PARAMS); +STRUCTDEF(CK_CCM_MESSAGE_PARAMS); +STRUCTDEF(CK_CCM_PARAMS); +STRUCTDEF(CK_CHACHA20_PARAMS); +STRUCTDEF(CK_CMS_SIG_PARAMS); +STRUCTDEF(CK_DES_CBC_ENCRYPT_DATA_PARAMS); +STRUCTDEF(CK_DSA_PARAMETER_GEN_PARAM); +STRUCTDEF(CK_ECDH_AES_KEY_WRAP_PARAMS); +STRUCTDEF(CK_ECDH1_DERIVE_PARAMS); +STRUCTDEF(CK_ECDH2_DERIVE_PARAMS); +STRUCTDEF(CK_ECMQV_DERIVE_PARAMS); +STRUCTDEF(CK_EDDSA_PARAMS); +STRUCTDEF(CK_GCM_MESSAGE_PARAMS); +STRUCTDEF(CK_GCM_PARAMS); +STRUCTDEF(CK_GOSTR3410_DERIVE_PARAMS); +STRUCTDEF(CK_GOSTR3410_KEY_WRAP_PARAMS); +STRUCTDEF(CK_HKDF_PARAMS); +STRUCTDEF(CK_KEA_DERIVE_PARAMS); +STRUCTDEF(CK_KEY_DERIVATION_STRING_DATA); +STRUCTDEF(CK_KEY_WRAP_SET_OAEP_PARAMS); +STRUCTDEF(CK_KIP_PARAMS); +STRUCTDEF(CK_OTP_PARAM); +STRUCTDEF(CK_OTP_PARAMS); +STRUCTDEF(CK_OTP_SIGNATURE_INFO); +STRUCTDEF(CK_PBE_PARAMS); +STRUCTDEF(CK_PKCS5_PBKD2_PARAMS); +STRUCTDEF(CK_PKCS5_PBKD2_PARAMS2); +STRUCTDEF(CK_PRF_DATA_PARAM); +STRUCTDEF(CK_RC2_CBC_PARAMS); +STRUCTDEF(CK_RC2_MAC_GENERAL_PARAMS); +STRUCTDEF(CK_RC5_CBC_PARAMS); +STRUCTDEF(CK_RC5_MAC_GENERAL_PARAMS); +STRUCTDEF(CK_RC5_PARAMS); +STRUCTDEF(CK_RSA_AES_KEY_WRAP_PARAMS); +STRUCTDEF(CK_RSA_PKCS_OAEP_PARAMS); +STRUCTDEF(CK_RSA_PKCS_PSS_PARAMS); +STRUCTDEF(CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS); +STRUCTDEF(CK_SALSA20_CHACHA20_POLY1305_PARAMS); +STRUCTDEF(CK_SALSA20_PARAMS); +STRUCTDEF(CK_SEED_CBC_ENCRYPT_DATA_PARAMS); +STRUCTDEF(CK_SKIPJACK_PRIVATE_WRAP_PARAMS); +STRUCTDEF(CK_SKIPJACK_RELAYX_PARAMS); +STRUCTDEF(CK_SP800_108_COUNTER_FORMAT); +STRUCTDEF(CK_SP800_108_DKM_LENGTH_FORMAT); +STRUCTDEF(CK_SP800_108_FEEDBACK_KDF_PARAMS); +STRUCTDEF(CK_SP800_108_KDF_PARAMS); +STRUCTDEF(CK_X2RATCHET_INITIALIZE_PARAMS); +STRUCTDEF(CK_X2RATCHET_RESPOND_PARAMS); +STRUCTDEF(CK_X3DH_INITIATE_PARAMS); +STRUCTDEF(CK_X3DH_RESPOND_PARAMS); +STRUCTDEF(CK_X9_42_DH1_DERIVE_PARAMS); +STRUCTDEF(CK_X9_42_DH2_DERIVE_PARAMS); +STRUCTDEF(CK_X9_42_MQV_DERIVE_PARAMS); +STRUCTDEF(CK_XEDDSA_PARAMS); +STRUCTDEF(specifiedParams); + +struct CK_AES_CBC_ENCRYPT_DATA_PARAMS { + CK_BYTE iv[16]; + CK_BYTE * pData; + CK_ULONG length; +}; + +struct CK_AES_CCM_PARAMS { + CK_ULONG ulDataLen; + CK_BYTE * pNonce; + CK_ULONG ulNonceLen; + CK_BYTE * pAAD; + CK_ULONG ulAADLen; + CK_ULONG ulMACLen; +}; + +struct CK_AES_CTR_PARAMS { + CK_ULONG ulCounterBits; + CK_BYTE cb[16]; +}; + +struct CK_AES_GCM_PARAMS { + CK_BYTE * pIv; + CK_ULONG ulIvLen; + CK_ULONG ulIvBits; + CK_BYTE * pAAD; + CK_ULONG ulAADLen; + CK_ULONG ulTagBits; +}; + +struct CK_ARIA_CBC_ENCRYPT_DATA_PARAMS { + CK_BYTE iv[16]; + CK_BYTE * pData; + CK_ULONG length; +}; + +struct CK_CAMELLIA_CBC_ENCRYPT_DATA_PARAMS { + CK_BYTE iv[16]; + CK_BYTE * pData; + CK_ULONG length; +}; + +struct CK_CAMELLIA_CTR_PARAMS { + CK_ULONG ulCounterBits; + CK_BYTE cb[16]; +}; + +struct CK_CCM_MESSAGE_PARAMS { + CK_ULONG ulDataLen; + CK_BYTE * pNonce; + CK_ULONG ulNonceLen; + CK_ULONG ulNonceFixedBits; + CK_GENERATOR_FUNCTION nonceGenerator; + CK_BYTE * pMAC; + CK_ULONG ulMACLen; +}; + +struct CK_CCM_PARAMS { + CK_ULONG ulDataLen; + CK_BYTE * pNonce; + CK_ULONG ulNonceLen; + CK_BYTE * pAAD; + CK_ULONG ulAADLen; + CK_ULONG ulMACLen; +}; + +struct CK_CHACHA20_PARAMS { + CK_BYTE * pBlockCounter; + CK_ULONG blockCounterBits; + CK_BYTE * pNonce; + CK_ULONG ulNonceBits; +}; + +struct CK_CMS_SIG_PARAMS { + CK_OBJECT_HANDLE certificateHandle; + CK_MECHANISM * pSigningMechanism; + CK_MECHANISM * pDigestMechanism; + CK_UTF8CHAR * pContentType; + CK_BYTE * pRequestedAttributes; + CK_ULONG ulRequestedAttributesLen; + CK_BYTE * pRequiredAttributes; + CK_ULONG ulRequiredAttributesLen; +}; + +struct CK_DES_CBC_ENCRYPT_DATA_PARAMS { + CK_BYTE iv[8]; + CK_BYTE * pData; + CK_ULONG length; +}; + +struct CK_DSA_PARAMETER_GEN_PARAM { + CK_MECHANISM_TYPE hash; + CK_BYTE * pSeed; + CK_ULONG ulSeedLen; + CK_ULONG ulIndex; +}; + +struct CK_ECDH_AES_KEY_WRAP_PARAMS { + CK_ULONG ulAESKeyBits; + CK_EC_KDF_TYPE kdf; + CK_ULONG ulSharedDataLen; + CK_BYTE * pSharedData; +}; + +struct CK_ECDH1_DERIVE_PARAMS { + CK_EC_KDF_TYPE kdf; + CK_ULONG ulSharedDataLen; + CK_BYTE * pSharedData; + CK_ULONG ulPublicDataLen; + CK_BYTE * pPublicData; +}; + +struct CK_ECDH2_DERIVE_PARAMS { + CK_EC_KDF_TYPE kdf; + CK_ULONG ulSharedDataLen; + CK_BYTE * pSharedData; + CK_ULONG ulPublicDataLen; + CK_BYTE * pPublicData; + CK_ULONG ulPrivateDataLen; + CK_OBJECT_HANDLE hPrivateData; + CK_ULONG ulPublicDataLen2; + CK_BYTE * pPublicData2; +}; + +struct CK_ECMQV_DERIVE_PARAMS { + CK_EC_KDF_TYPE kdf; + CK_ULONG ulSharedDataLen; + CK_BYTE * pSharedData; + CK_ULONG ulPublicDataLen; + CK_BYTE * pPublicData; + CK_ULONG ulPrivateDataLen; + CK_OBJECT_HANDLE hPrivateData; + CK_ULONG ulPublicDataLen2; + CK_BYTE * pPublicData2; + CK_OBJECT_HANDLE publicKey; +}; + +struct CK_EDDSA_PARAMS { + CK_BBOOL phFlag; + CK_ULONG ulContextDataLen; + CK_BYTE * pContextData; +}; + +struct CK_GCM_MESSAGE_PARAMS { + CK_BYTE * pIv; + CK_ULONG ulIvLen; + CK_ULONG ulIvFixedBits; + CK_GENERATOR_FUNCTION ivGenerator; + CK_BYTE * pTag; + CK_ULONG ulTagBits; +}; + +struct CK_GCM_PARAMS { + CK_BYTE * pIv; + CK_ULONG ulIvLen; + CK_ULONG ulIvBits; + CK_BYTE * pAAD; + CK_ULONG ulAADLen; + CK_ULONG ulTagBits; +}; + +struct CK_GOSTR3410_DERIVE_PARAMS { + CK_EC_KDF_TYPE kdf; + CK_BYTE * pPublicData; + CK_ULONG ulPublicDataLen; + CK_BYTE * pUKM; + CK_ULONG ulUKMLen; +}; + +struct CK_GOSTR3410_KEY_WRAP_PARAMS { + CK_BYTE * pWrapOID; + CK_ULONG ulWrapOIDLen; + CK_BYTE * pUKM; + CK_ULONG ulUKMLen; + CK_OBJECT_HANDLE hKey; +}; + +struct CK_HKDF_PARAMS { + CK_BBOOL bExtract; + CK_BBOOL bExpand; + CK_MECHANISM_TYPE prfHashMechanism; + CK_ULONG ulSaltType; + CK_BYTE * pSalt; + CK_ULONG ulSaltLen; + CK_OBJECT_HANDLE hSaltKey; + CK_BYTE * pInfo; + CK_ULONG ulInfoLen; +}; + +struct CK_KEA_DERIVE_PARAMS { + CK_BBOOL isSender; + CK_ULONG ulRandomLen; + CK_BYTE * RandomA; + CK_BYTE * RandomB; + CK_ULONG ulPublicDataLen; + CK_BYTE * PublicData; +}; + +struct CK_KEY_DERIVATION_STRING_DATA { + CK_BYTE * pData; + CK_ULONG ulLen; +}; + +struct CK_KEY_WRAP_SET_OAEP_PARAMS { + CK_BYTE bBC; + CK_BYTE * pX; + CK_ULONG ulXLen; +}; + +struct CK_KIP_PARAMS { + CK_MECHANISM * pMechanism; + CK_OBJECT_HANDLE hKey; + CK_BYTE * pSeed; + CK_ULONG ulSeedLen; +}; + +struct CK_OTP_PARAM { + CK_OTP_PARAM_TYPE type; + void * pValue; + CK_ULONG ulValueLen; +}; + +struct CK_OTP_PARAMS { + CK_OTP_PARAM * pParams; + CK_ULONG ulCount; +}; + +struct CK_OTP_SIGNATURE_INFO { + CK_OTP_PARAM * pParams; + CK_ULONG ulCount; +}; + +struct CK_PBE_PARAMS { + CK_BYTE * pInitVector; + CK_UTF8CHAR * pPassword; + CK_ULONG ulPasswordLen; + CK_BYTE * pSalt; + CK_ULONG ulSaltLen; + CK_ULONG ulIteration; +}; + +struct CK_PKCS5_PBKD2_PARAMS { + CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE saltSource; + void * pSaltSourceData; + CK_ULONG ulSaltSourceDataLen; + CK_ULONG iterations; + CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE prf; + void * pPrfData; + CK_ULONG ulPrfDataLen; + CK_UTF8CHAR * pPassword; + CK_ULONG * ulPasswordLen; +}; + +struct CK_PKCS5_PBKD2_PARAMS2 { + CK_PKCS5_PBKDF2_SALT_SOURCE_TYPE saltSource; + void * pSaltSourceData; + CK_ULONG ulSaltSourceDataLen; + CK_ULONG iterations; + CK_PKCS5_PBKD2_PSEUDO_RANDOM_FUNCTION_TYPE prf; + void * pPrfData; + CK_ULONG ulPrfDataLen; + CK_UTF8CHAR * pPassword; + CK_ULONG ulPasswordLen; +}; + +struct CK_PRF_DATA_PARAM { + CK_PRF_DATA_TYPE type; + void * pValue; + CK_ULONG ulValueLen; +}; + +struct CK_RC2_CBC_PARAMS { + CK_ULONG ulEffectiveBits; + CK_BYTE iv[8]; +}; + +struct CK_RC2_MAC_GENERAL_PARAMS { + CK_ULONG ulEffectiveBits; + CK_ULONG ulMacLength; +}; + +struct CK_RC5_CBC_PARAMS { + CK_ULONG ulWordsize; + CK_ULONG ulRounds; + CK_BYTE * pIv; + CK_ULONG ulIvLen; +}; + +struct CK_RC5_MAC_GENERAL_PARAMS { + CK_ULONG ulWordsize; + CK_ULONG ulRounds; + CK_ULONG ulMacLength; +}; + +struct CK_RC5_PARAMS { + CK_ULONG ulWordsize; + CK_ULONG ulRounds; +}; + +struct CK_RSA_AES_KEY_WRAP_PARAMS { + CK_ULONG ulAESKeyBits; + CK_RSA_PKCS_OAEP_PARAMS * pOAEPParams; +}; + +struct CK_RSA_PKCS_OAEP_PARAMS { + CK_MECHANISM_TYPE hashAlg; + CK_RSA_PKCS_MGF_TYPE mgf; + CK_RSA_PKCS_OAEP_SOURCE_TYPE source; + void * pSourceData; + CK_ULONG ulSourceDataLen; +}; + +struct CK_RSA_PKCS_PSS_PARAMS { + CK_MECHANISM_TYPE hashAlg; + CK_RSA_PKCS_MGF_TYPE mgf; + CK_ULONG sLen; +}; + +struct CK_SALSA20_CHACHA20_POLY1305_MSG_PARAMS { + CK_BYTE * pNonce; + CK_ULONG ulNonceLen; + CK_BYTE * pTag; +}; + +struct CK_SALSA20_CHACHA20_POLY1305_PARAMS { + CK_BYTE * pNonce; + CK_ULONG ulNonceLen; + CK_BYTE * pAAD; + CK_ULONG ulAADLen; +}; + +struct CK_SALSA20_PARAMS { + CK_BYTE * pBlockCounter; + CK_BYTE * pNonce; + CK_ULONG ulNonceBits; +}; + +struct CK_SEED_CBC_ENCRYPT_DATA_PARAMS { + CK_BYTE iv[16]; + CK_BYTE * pData; + CK_ULONG length; +}; + +struct CK_SKIPJACK_PRIVATE_WRAP_PARAMS { + CK_ULONG ulPasswordLen; + CK_BYTE * pPassword; + CK_ULONG ulPublicDataLen; + CK_BYTE * pPublicData; + CK_ULONG ulPAndGLen; + CK_ULONG ulQLen; + CK_ULONG ulRandomLen; + CK_BYTE * pRandomA; + CK_BYTE * pPrimeP; + CK_BYTE * pBaseG; + CK_BYTE * pSubprimeQ; +}; + +struct CK_SKIPJACK_RELAYX_PARAMS { + CK_ULONG ulOldWrappedXLen; + CK_BYTE * pOldWrappedX; + CK_ULONG ulOldPasswordLen; + CK_BYTE * pOldPassword; + CK_ULONG ulOldPublicDataLen; + CK_BYTE * pOldPublicData; + CK_ULONG ulOldRandomLen; + CK_BYTE * pOldRandomA; + CK_ULONG ulNewPasswordLen; + CK_BYTE * pNewPassword; + CK_ULONG ulNewPublicDataLen; + CK_BYTE * pNewPublicData; + CK_ULONG ulNewRandomLen; + CK_BYTE * pNewRandomA; +}; + +struct CK_SP800_108_COUNTER_FORMAT { + CK_BBOOL bLittleEndian; + CK_ULONG ulWidthInBits; +}; + +struct CK_SP800_108_DKM_LENGTH_FORMAT { + CK_SP800_108_DKM_LENGTH_METHOD dkmLengthMethod; + CK_BBOOL bLittleEndian; + CK_ULONG ulWidthInBits; +}; + +typedef CK_MECHANISM_TYPE CK_SP800_108_PRF_TYPE; + +struct CK_SP800_108_FEEDBACK_KDF_PARAMS +{ + CK_SP800_108_PRF_TYPE prfType; + CK_ULONG ulNumberOfDataParams; + CK_PRF_DATA_PARAM * pDataParams; + CK_ULONG ulIVLen; + CK_BYTE * pIV; + CK_ULONG ulAdditionalDerivedKeys; + CK_DERIVED_KEY * pAdditionalDerivedKeys; +}; + +struct CK_SP800_108_KDF_PARAMS +{ + CK_SP800_108_PRF_TYPE prfType; + CK_ULONG ulNumberOfDataParams; + CK_PRF_DATA_PARAM * pDataParams; + CK_ULONG ulAdditionalDerivedKeys; + CK_DERIVED_KEY * pAdditionalDerivedKeys; +}; + +struct CK_X2RATCHET_INITIALIZE_PARAMS { + CK_BYTE * sk; + CK_OBJECT_HANDLE peer_public_prekey; + CK_OBJECT_HANDLE peer_public_identity; + CK_OBJECT_HANDLE own_public_identity; + CK_BBOOL bEncryptedHeader; + CK_ULONG eCurve; + CK_MECHANISM_TYPE aeadMechanism; + CK_X2RATCHET_KDF_TYPE kdfMechanism; +}; + +struct CK_X2RATCHET_RESPOND_PARAMS { + CK_BYTE * sk; + CK_OBJECT_HANDLE own_prekey; + CK_OBJECT_HANDLE initiator_identity; + CK_OBJECT_HANDLE own_public_identity; + CK_BBOOL bEncryptedHeader; + CK_ULONG eCurve; + CK_MECHANISM_TYPE aeadMechanism; + CK_X2RATCHET_KDF_TYPE kdfMechanism; +}; + +struct CK_X3DH_INITIATE_PARAMS { + CK_X3DH_KDF_TYPE kdf; + CK_OBJECT_HANDLE pPeer_identity; + CK_OBJECT_HANDLE pPeer_prekey; + CK_BYTE * pPrekey_signature; + CK_BYTE * pOnetime_key; + CK_OBJECT_HANDLE pOwn_identity; + CK_OBJECT_HANDLE pOwn_ephemeral; +}; + +struct CK_X3DH_RESPOND_PARAMS { + CK_X3DH_KDF_TYPE kdf; + CK_BYTE * pIdentity_id; + CK_BYTE * pPrekey_id; + CK_BYTE * pOnetime_id; + CK_OBJECT_HANDLE pInitiator_identity; + CK_BYTE * pInitiator_ephemeral; +}; + +struct CK_X9_42_DH1_DERIVE_PARAMS { + CK_X9_42_DH_KDF_TYPE kdf; + CK_ULONG ulOtherInfoLen; + CK_BYTE * pOtherInfo; + CK_ULONG ulPublicDataLen; + CK_BYTE * pPublicData; +}; + +struct CK_X9_42_DH2_DERIVE_PARAMS { + CK_X9_42_DH_KDF_TYPE kdf; + CK_ULONG ulOtherInfoLen; + CK_BYTE * pOtherInfo; + CK_ULONG ulPublicDataLen; + CK_BYTE * pPublicData; + CK_ULONG ulPrivateDataLen; + CK_OBJECT_HANDLE hPrivateData; + CK_ULONG ulPublicDataLen2; + CK_BYTE * pPublicData2; +}; + +struct CK_X9_42_MQV_DERIVE_PARAMS { + CK_X9_42_DH_KDF_TYPE kdf; + CK_ULONG ulOtherInfoLen; + CK_BYTE * OtherInfo; + CK_ULONG ulPublicDataLen; + CK_BYTE * PublicData; + CK_ULONG ulPrivateDataLen; + CK_OBJECT_HANDLE hPrivateData; + CK_ULONG ulPublicDataLen2; + CK_BYTE * PublicData2; + CK_OBJECT_HANDLE publicKey; +}; + +struct CK_XEDDSA_PARAMS { + CK_XEDDSA_HASH_TYPE hash; +}; + +/* TLS related structure definitions */ +STRUCTDEF(CK_SSL3_KEY_MAT_OUT); +STRUCTDEF(CK_SSL3_KEY_MAT_PARAMS); +STRUCTDEF(CK_SSL3_MASTER_KEY_DERIVE_PARAMS); +STRUCTDEF(CK_SSL3_RANDOM_DATA); +STRUCTDEF(CK_TLS_KDF_PARAMS); +STRUCTDEF(CK_TLS_MAC_PARAMS); +STRUCTDEF(CK_TLS_PRF_PARAMS); +STRUCTDEF(CK_TLS12_KEY_MAT_PARAMS); +STRUCTDEF(CK_TLS12_MASTER_KEY_DERIVE_PARAMS); +STRUCTDEF(CK_WTLS_KEY_MAT_OUT); +STRUCTDEF(CK_WTLS_KEY_MAT_PARAMS); +STRUCTDEF(CK_WTLS_MASTER_KEY_DERIVE_PARAMS); +STRUCTDEF(CK_WTLS_PRF_PARAMS); +STRUCTDEF(CK_WTLS_RANDOM_DATA); + +struct CK_SSL3_KEY_MAT_OUT { + CK_OBJECT_HANDLE hClientMacSecret; + CK_OBJECT_HANDLE hServerMacSecret; + CK_OBJECT_HANDLE hClientKey; + CK_OBJECT_HANDLE hServerKey; + CK_BYTE * pIVClient; + CK_BYTE * pIVServer; +}; + +struct CK_SSL3_RANDOM_DATA { + CK_BYTE * pClientRandom; + CK_ULONG ulClientRandomLen; + CK_BYTE * pServerRandom; + CK_ULONG ulServerRandomLen; +}; + +struct CK_SSL3_KEY_MAT_PARAMS { + CK_ULONG ulMacSizeInBits; + CK_ULONG ulKeySizeInBits; + CK_ULONG ulIVSizeInBits; + CK_BBOOL bIsExport; + CK_SSL3_RANDOM_DATA RandomInfo; + CK_SSL3_KEY_MAT_OUT * pReturnedKeyMaterial; +}; + +struct CK_SSL3_MASTER_KEY_DERIVE_PARAMS { + CK_SSL3_RANDOM_DATA RandomInfo; + CK_VERSION * pVersion; +}; + +struct CK_TLS_KDF_PARAMS { + CK_MECHANISM_TYPE prfMechanism; + CK_BYTE * pLabel; + CK_ULONG ulLabelLength; + CK_SSL3_RANDOM_DATA RandomInfo; + CK_BYTE * pContextData; + CK_ULONG ulContextDataLength; +}; + +struct CK_TLS_MAC_PARAMS { + CK_MECHANISM_TYPE prfHashMechanism; + CK_ULONG ulMacLength; + CK_ULONG ulServerOrClient; +}; + +struct CK_TLS_PRF_PARAMS { + CK_BYTE * pSeed; + CK_ULONG ulSeedLen; + CK_BYTE * pLabel; + CK_ULONG ulLabelLen; + CK_BYTE * pOutput; + CK_ULONG * pulOutputLen; +}; + +struct CK_TLS12_KEY_MAT_PARAMS { + CK_ULONG ulMacSizeInBits; + CK_ULONG ulKeySizeInBits; + CK_ULONG ulIVSizeInBits; + CK_BBOOL bIsExport; + CK_SSL3_RANDOM_DATA RandomInfo; + CK_SSL3_KEY_MAT_OUT * pReturnedKeyMaterial; + CK_MECHANISM_TYPE prfHashMechanism; +}; + +struct CK_TLS12_MASTER_KEY_DERIVE_PARAMS { + CK_SSL3_RANDOM_DATA RandomInfo; + CK_VERSION * pVersion; + CK_MECHANISM_TYPE prfHashMechanism; +}; + +struct CK_WTLS_KEY_MAT_OUT { + CK_OBJECT_HANDLE hMacSecret; + CK_OBJECT_HANDLE hKey; + CK_BYTE * pIV; +}; + +struct CK_WTLS_RANDOM_DATA { + CK_BYTE * pClientRandom; + CK_ULONG ulClientRandomLen; + CK_BYTE * pServerRandom; + CK_ULONG ulServerRandomLen; +}; + +struct CK_WTLS_KEY_MAT_PARAMS { + CK_MECHANISM_TYPE DigestMechanism; + CK_ULONG ulMacSizeInBits; + CK_ULONG ulKeySizeInBits; + CK_ULONG ulIVSizeInBits; + CK_ULONG ulSequenceNumber; + CK_BBOOL bIsExport; + CK_WTLS_RANDOM_DATA RandomInfo; + CK_WTLS_KEY_MAT_OUT * pReturnedKeyMaterial; +}; + +struct CK_WTLS_MASTER_KEY_DERIVE_PARAMS { + CK_MECHANISM_TYPE DigestMechanism; + CK_WTLS_RANDOM_DATA RandomInfo; + CK_BYTE * pVersion; +}; + +struct CK_WTLS_PRF_PARAMS { + CK_MECHANISM_TYPE DigestMechanism; + CK_BYTE * pSeed; + CK_ULONG ulSeedLen; + CK_BYTE * pLabel; + CK_ULONG ulLabelLen; + CK_BYTE * pOutput; + CK_ULONG * pulOutputLen; +}; + +/* PKCS11 Functions */ +extern CK_RV C_Initialize(void *); +extern CK_RV C_Finalize(void *); +extern CK_RV C_GetInfo(CK_INFO *); +extern CK_RV C_GetFunctionList(CK_FUNCTION_LIST **); +extern CK_RV C_GetSlotList(CK_BBOOL, CK_SLOT_ID *, CK_ULONG *); +extern CK_RV C_GetSlotInfo(CK_SLOT_ID, CK_SLOT_INFO *); +extern CK_RV C_GetTokenInfo(CK_SLOT_ID, CK_TOKEN_INFO *); +extern CK_RV C_GetMechanismList(CK_SLOT_ID, CK_MECHANISM_TYPE *, CK_ULONG *); +extern CK_RV C_GetMechanismInfo(CK_SLOT_ID, CK_MECHANISM_TYPE, + CK_MECHANISM_INFO *); +extern CK_RV C_InitToken(CK_SLOT_ID, CK_UTF8CHAR *, CK_ULONG, CK_UTF8CHAR *); +extern CK_RV C_InitPIN(CK_SESSION_HANDLE, CK_UTF8CHAR *, CK_ULONG); +extern CK_RV C_SetPIN(CK_SESSION_HANDLE, CK_UTF8CHAR *, CK_ULONG, CK_UTF8CHAR *, + CK_ULONG); +extern CK_RV C_OpenSession(CK_SLOT_ID, CK_FLAGS, void *, CK_NOTIFY, + CK_SESSION_HANDLE *); +extern CK_RV C_CloseSession(CK_SESSION_HANDLE); +extern CK_RV C_CloseAllSessions(CK_SLOT_ID); +extern CK_RV C_GetSessionInfo(CK_SESSION_HANDLE, CK_SESSION_INFO *); +extern CK_RV C_GetOperationState(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG *); +extern CK_RV C_SetOperationState(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_OBJECT_HANDLE, CK_OBJECT_HANDLE); +extern CK_RV C_Login(CK_SESSION_HANDLE, CK_USER_TYPE, CK_UTF8CHAR *, CK_ULONG); +extern CK_RV C_Logout(CK_SESSION_HANDLE); +extern CK_RV C_CreateObject(CK_SESSION_HANDLE, CK_ATTRIBUTE *, CK_ULONG, + CK_OBJECT_HANDLE *); +extern CK_RV C_CopyObject(CK_SESSION_HANDLE, CK_OBJECT_HANDLE, CK_ATTRIBUTE *, + CK_ULONG, CK_OBJECT_HANDLE *); +extern CK_RV C_DestroyObject(CK_SESSION_HANDLE, CK_OBJECT_HANDLE); +extern CK_RV C_GetObjectSize(CK_SESSION_HANDLE, CK_OBJECT_HANDLE, CK_ULONG *); +extern CK_RV C_GetAttributeValue(CK_SESSION_HANDLE, CK_OBJECT_HANDLE, + CK_ATTRIBUTE *, CK_ULONG); +extern CK_RV C_SetAttributeValue(CK_SESSION_HANDLE, CK_OBJECT_HANDLE, + CK_ATTRIBUTE *, CK_ULONG); +extern CK_RV C_FindObjectsInit(CK_SESSION_HANDLE, CK_ATTRIBUTE *, CK_ULONG); +extern CK_RV C_FindObjects(CK_SESSION_HANDLE, CK_OBJECT_HANDLE *, CK_ULONG, + CK_ULONG *); +extern CK_RV C_FindObjectsFinal(CK_SESSION_HANDLE); +extern CK_RV C_EncryptInit(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +extern CK_RV C_Encrypt(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *); +extern CK_RV C_EncryptUpdate(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +extern CK_RV C_EncryptFinal(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG *); +extern CK_RV C_DecryptInit(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +extern CK_RV C_Decrypt(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *); +extern CK_RV C_DecryptUpdate(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +extern CK_RV C_DecryptFinal(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG *); +extern CK_RV C_DigestInit(CK_SESSION_HANDLE, CK_MECHANISM *); +extern CK_RV C_Digest(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *); +extern CK_RV C_DigestUpdate(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +extern CK_RV C_DigestKey(CK_SESSION_HANDLE, CK_OBJECT_HANDLE); +extern CK_RV C_DigestFinal(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG *); +extern CK_RV C_SignInit(CK_SESSION_HANDLE, CK_MECHANISM *, CK_OBJECT_HANDLE); +extern CK_RV C_Sign(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *); +extern CK_RV C_SignUpdate(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +extern CK_RV C_SignFinal(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG *); +extern CK_RV C_SignRecoverInit(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +extern CK_RV C_SignRecover(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *); +extern CK_RV C_VerifyInit(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +extern CK_RV C_Verify(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG); +extern CK_RV C_VerifyUpdate(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +extern CK_RV C_VerifyFinal(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +extern CK_RV C_VerifyRecoverInit(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +extern CK_RV C_VerifyRecover(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +extern CK_RV C_DigestEncryptUpdate(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +extern CK_RV C_DecryptDigestUpdate(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +extern CK_RV C_SignEncryptUpdate(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +extern CK_RV C_DecryptVerifyUpdate(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +extern CK_RV C_GenerateKey(CK_SESSION_HANDLE, CK_MECHANISM *, CK_ATTRIBUTE *, + CK_ULONG, CK_OBJECT_HANDLE *); +extern CK_RV C_GenerateKeyPair(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_ATTRIBUTE *, CK_ULONG, CK_ATTRIBUTE *, + CK_ULONG, CK_OBJECT_HANDLE *, + CK_OBJECT_HANDLE *); +extern CK_RV C_WrapKey(CK_SESSION_HANDLE, CK_MECHANISM *, CK_OBJECT_HANDLE, + CK_OBJECT_HANDLE, CK_BYTE *, CK_ULONG *); +extern CK_RV C_UnwrapKey(CK_SESSION_HANDLE, CK_MECHANISM *, CK_OBJECT_HANDLE, + CK_BYTE *, CK_ULONG *, CK_ATTRIBUTE *, CK_ULONG, + CK_OBJECT_HANDLE *); +extern CK_RV C_DeriveKey(CK_SESSION_HANDLE, CK_MECHANISM *, CK_OBJECT_HANDLE, + CK_ATTRIBUTE *, CK_ULONG, CK_OBJECT_HANDLE *); +extern CK_RV C_SeedRandom(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +extern CK_RV C_GenerateRandom(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +extern CK_RV C_GetFunctionStatus(CK_SESSION_HANDLE); +extern CK_RV C_CancelFunction(CK_SESSION_HANDLE); +extern CK_RV C_WaitForSlotEvent(CK_FLAGS, CK_SLOT_ID *, void *); +extern CK_RV C_GetInterfaceList(CK_INTERFACE *, CK_ULONG *); +extern CK_RV C_GetInterface(CK_UTF8CHAR *, CK_VERSION *, CK_INTERFACE **, + CK_FLAGS); +extern CK_RV C_LoginUser(CK_SESSION_HANDLE, CK_USER_TYPE, CK_UTF8CHAR *, + CK_ULONG, CK_UTF8CHAR *, CK_ULONG); +extern CK_RV C_SessionCancel(CK_SESSION_HANDLE, CK_FLAGS); +extern CK_RV C_MessageEncryptInit(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +extern CK_RV C_EncryptMessage(CK_SESSION_HANDLE, void *, CK_ULONG, CK_BYTE *, + CK_ULONG, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *); +extern CK_RV C_EncryptMessageBegin(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG); +extern CK_RV C_EncryptMessageNext(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, CK_ULONG *, + CK_FLAGS); +extern CK_RV C_MessageEncryptFinal(CK_SESSION_HANDLE); +extern CK_RV C_MessageDecryptInit(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +extern CK_RV C_DecryptMessage(CK_SESSION_HANDLE, void *, CK_ULONG, CK_BYTE *, + CK_ULONG, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *); +extern CK_RV C_DecryptMessageBegin(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG); +extern CK_RV C_DecryptMessageNext(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, CK_ULONG *, + CK_FLAGS); +extern CK_RV C_MessageDecryptFinal(CK_SESSION_HANDLE); +extern CK_RV C_MessageSignInit(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +extern CK_RV C_SignMessage(CK_SESSION_HANDLE, void *, CK_ULONG, CK_BYTE *, + CK_ULONG, CK_BYTE *, CK_ULONG *); +extern CK_RV C_SignMessageBegin(CK_SESSION_HANDLE, void *, CK_ULONG); +extern CK_RV C_SignMessageNext(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, CK_ULONG *); +extern CK_RV C_MessageSignFinal(CK_SESSION_HANDLE); +extern CK_RV C_MessageVerifyInit(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +extern CK_RV C_VerifyMessage(CK_SESSION_HANDLE, void *, CK_ULONG, CK_BYTE *, + CK_ULONG, CK_BYTE *, CK_ULONG); +extern CK_RV C_VerifyMessageBegin(CK_SESSION_HANDLE, void *, CK_ULONG); +extern CK_RV C_VerifyMessageNext(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, CK_ULONG); +extern CK_RV C_MessageVerifyFinal(CK_SESSION_HANDLE); + +typedef CK_RV (* CK_C_Initialize)(void *); +typedef CK_RV (* CK_C_Finalize)(void *); +typedef CK_RV (* CK_C_GetInfo)(CK_INFO *); +typedef CK_RV (* CK_C_GetFunctionList)(CK_FUNCTION_LIST **); +typedef CK_RV (* CK_C_GetSlotList)(CK_BBOOL, CK_SLOT_ID *, CK_ULONG *); +typedef CK_RV (* CK_C_GetSlotInfo)(CK_SLOT_ID, CK_SLOT_INFO *); +typedef CK_RV (* CK_C_GetTokenInfo)(CK_SLOT_ID, CK_TOKEN_INFO *); +typedef CK_RV (* CK_C_GetMechanismList)(CK_SLOT_ID, CK_MECHANISM_TYPE *, + CK_ULONG *); +typedef CK_RV (* CK_C_GetMechanismInfo)(CK_SLOT_ID, CK_MECHANISM_TYPE, + CK_MECHANISM_INFO *); +typedef CK_RV (* CK_C_InitToken)(CK_SLOT_ID, CK_UTF8CHAR *, CK_ULONG, + CK_UTF8CHAR *); +typedef CK_RV (* CK_C_InitPIN)(CK_SESSION_HANDLE, CK_UTF8CHAR *, CK_ULONG); +typedef CK_RV (* CK_C_SetPIN)(CK_SESSION_HANDLE, CK_UTF8CHAR *, CK_ULONG, + CK_UTF8CHAR *, CK_ULONG); +typedef CK_RV (* CK_C_OpenSession)(CK_SLOT_ID, CK_FLAGS, void *, CK_NOTIFY, + CK_SESSION_HANDLE *); +typedef CK_RV (* CK_C_CloseSession)(CK_SESSION_HANDLE); +typedef CK_RV (* CK_C_CloseAllSessions)(CK_SLOT_ID); +typedef CK_RV (* CK_C_GetSessionInfo)(CK_SESSION_HANDLE, CK_SESSION_INFO *); +typedef CK_RV (* CK_C_GetOperationState)(CK_SESSION_HANDLE, CK_BYTE *, + CK_ULONG *); +typedef CK_RV (* CK_C_SetOperationState)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_OBJECT_HANDLE, CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_Login)(CK_SESSION_HANDLE, CK_USER_TYPE, CK_UTF8CHAR *, + CK_ULONG); +typedef CK_RV (* CK_C_Logout)(CK_SESSION_HANDLE); +typedef CK_RV (* CK_C_CreateObject)(CK_SESSION_HANDLE, CK_ATTRIBUTE *, CK_ULONG, + CK_OBJECT_HANDLE *); +typedef CK_RV (* CK_C_CopyObject)(CK_SESSION_HANDLE, CK_OBJECT_HANDLE, + CK_ATTRIBUTE *, CK_ULONG, CK_OBJECT_HANDLE *); +typedef CK_RV (* CK_C_DestroyObject)(CK_SESSION_HANDLE, CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_GetObjectSize)(CK_SESSION_HANDLE, CK_OBJECT_HANDLE, + CK_ULONG *); +typedef CK_RV (* CK_C_GetAttributeValue)(CK_SESSION_HANDLE, CK_OBJECT_HANDLE, + CK_ATTRIBUTE *, CK_ULONG); +typedef CK_RV (* CK_C_SetAttributeValue)(CK_SESSION_HANDLE, CK_OBJECT_HANDLE, + CK_ATTRIBUTE *, CK_ULONG); +typedef CK_RV (* CK_C_FindObjectsInit)(CK_SESSION_HANDLE, CK_ATTRIBUTE *, + CK_ULONG); +typedef CK_RV (* CK_C_FindObjects)(CK_SESSION_HANDLE, CK_OBJECT_HANDLE *, + CK_ULONG, CK_ULONG *); +typedef CK_RV (* CK_C_FindObjectsFinal)(CK_SESSION_HANDLE); +typedef CK_RV (* CK_C_EncryptInit)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_Encrypt)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_EncryptUpdate)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_EncryptFinal)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_DecryptInit)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_Decrypt)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_DecryptUpdate)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_DecryptFinal)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_DigestInit)(CK_SESSION_HANDLE, CK_MECHANISM *); +typedef CK_RV (* CK_C_Digest)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *); +typedef CK_RV (* CK_C_DigestUpdate)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +typedef CK_RV (* CK_C_DigestKey)(CK_SESSION_HANDLE, CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_DigestFinal)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_SignInit)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_Sign)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *); +typedef CK_RV (* CK_C_SignUpdate)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +typedef CK_RV (* CK_C_SignFinal)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_SignRecoverInit)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_SignRecover)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_VerifyInit)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_Verify)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG); +typedef CK_RV (* CK_C_VerifyUpdate)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +typedef CK_RV (* CK_C_VerifyFinal)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +typedef CK_RV (* CK_C_VerifyRecoverInit)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_VerifyRecover)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_DigestEncryptUpdate)(CK_SESSION_HANDLE, CK_BYTE *, + CK_ULONG, CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_DecryptDigestUpdate)(CK_SESSION_HANDLE, CK_BYTE *, + CK_ULONG, CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_SignEncryptUpdate)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_DecryptVerifyUpdate)(CK_SESSION_HANDLE, CK_BYTE *, + CK_ULONG, CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_GenerateKey)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_ATTRIBUTE *, CK_ULONG, + CK_OBJECT_HANDLE *); +typedef CK_RV (* CK_C_GenerateKeyPair)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_ATTRIBUTE *, CK_ULONG, CK_ATTRIBUTE *, + CK_ULONG, CK_OBJECT_HANDLE *, + CK_OBJECT_HANDLE *); +typedef CK_RV (* CK_C_WrapKey)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE, CK_OBJECT_HANDLE, CK_BYTE *, + CK_ULONG *); +typedef CK_RV (* CK_C_UnwrapKey)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE, CK_BYTE *, CK_ULONG, + CK_ATTRIBUTE *, CK_ULONG, CK_OBJECT_HANDLE *); +typedef CK_RV (* CK_C_DeriveKey)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE, CK_ATTRIBUTE *, CK_ULONG, + CK_OBJECT_HANDLE *); +typedef CK_RV (* CK_C_SeedRandom)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +typedef CK_RV (* CK_C_GenerateRandom)(CK_SESSION_HANDLE, CK_BYTE *, CK_ULONG); +typedef CK_RV (* CK_C_GetFunctionStatus)(CK_SESSION_HANDLE); +typedef CK_RV (* CK_C_CancelFunction)(CK_SESSION_HANDLE); +typedef CK_RV (* CK_C_WaitForSlotEvent)(CK_FLAGS, CK_SLOT_ID *, void *); +typedef CK_RV (* CK_C_GetInterfaceList)(CK_INTERFACE *, CK_ULONG *); +typedef CK_RV (* CK_C_GetInterface)(CK_UTF8CHAR *, CK_VERSION *, + CK_INTERFACE **, CK_FLAGS); +typedef CK_RV (* CK_C_LoginUser)(CK_SESSION_HANDLE, CK_USER_TYPE, CK_UTF8CHAR *, + CK_ULONG, CK_UTF8CHAR *, CK_ULONG); +typedef CK_RV (* CK_C_SessionCancel)(CK_SESSION_HANDLE, CK_FLAGS); +typedef CK_RV (* CK_C_MessageEncryptInit)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_EncryptMessage)(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_EncryptMessageBegin)(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG); +typedef CK_RV (* CK_C_EncryptMessageNext)(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *, CK_FLAGS); +typedef CK_RV (* CK_C_MessageEncryptFinal)(CK_SESSION_HANDLE); +typedef CK_RV (* CK_C_MessageDecryptInit)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_DecryptMessage)(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, CK_ULONG, + CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_DecryptMessageBegin)(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG); +typedef CK_RV (* CK_C_DecryptMessageNext)(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *, CK_FLAGS); +typedef CK_RV (* CK_C_MessageDecryptFinal)(CK_SESSION_HANDLE); +typedef CK_RV (* CK_C_MessageSignInit)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_SignMessage)(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, CK_ULONG *); +typedef CK_RV (* CK_C_SignMessageBegin)(CK_SESSION_HANDLE, void *, CK_ULONG); +typedef CK_RV (* CK_C_SignMessageNext)(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG *); +typedef CK_RV (* CK_C_MessageSignFinal)(CK_SESSION_HANDLE); +typedef CK_RV (* CK_C_MessageVerifyInit)(CK_SESSION_HANDLE, CK_MECHANISM *, + CK_OBJECT_HANDLE); +typedef CK_RV (* CK_C_VerifyMessage)(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, CK_ULONG); +typedef CK_RV (* CK_C_VerifyMessageBegin)(CK_SESSION_HANDLE, void *, CK_ULONG); +typedef CK_RV (* CK_C_VerifyMessageNext)(CK_SESSION_HANDLE, void *, CK_ULONG, + CK_BYTE *, CK_ULONG, CK_BYTE *, + CK_ULONG); +typedef CK_RV (* CK_C_MessageVerifyFinal)(CK_SESSION_HANDLE); + +struct CK_FUNCTION_LIST_3_0 { + CK_VERSION version; + CK_C_Initialize C_Initialize; + CK_C_Finalize C_Finalize; + CK_C_GetInfo C_GetInfo; + CK_C_GetFunctionList C_GetFunctionList; + CK_C_GetSlotList C_GetSlotList; + CK_C_GetSlotInfo C_GetSlotInfo; + CK_C_GetTokenInfo C_GetTokenInfo; + CK_C_GetMechanismList C_GetMechanismList; + CK_C_GetMechanismInfo C_GetMechanismInfo; + CK_C_InitToken C_InitToken; + CK_C_InitPIN C_InitPIN; + CK_C_SetPIN C_SetPIN; + CK_C_OpenSession C_OpenSession; + CK_C_CloseSession C_CloseSession; + CK_C_CloseAllSessions C_CloseAllSessions; + CK_C_GetSessionInfo C_GetSessionInfo; + CK_C_GetOperationState C_GetOperationState; + CK_C_SetOperationState C_SetOperationState; + CK_C_Login C_Login; + CK_C_Logout C_Logout; + CK_C_CreateObject C_CreateObject; + CK_C_CopyObject C_CopyObject; + CK_C_DestroyObject C_DestroyObject; + CK_C_GetObjectSize C_GetObjectSize; + CK_C_GetAttributeValue C_GetAttributeValue; + CK_C_SetAttributeValue C_SetAttributeValue; + CK_C_FindObjectsInit C_FindObjectsInit; + CK_C_FindObjects C_FindObjects; + CK_C_FindObjectsFinal C_FindObjectsFinal; + CK_C_EncryptInit C_EncryptInit; + CK_C_Encrypt C_Encrypt; + CK_C_EncryptUpdate C_EncryptUpdate; + CK_C_EncryptFinal C_EncryptFinal; + CK_C_DecryptInit C_DecryptInit; + CK_C_Decrypt C_Decrypt; + CK_C_DecryptUpdate C_DecryptUpdate; + CK_C_DecryptFinal C_DecryptFinal; + CK_C_DigestInit C_DigestInit; + CK_C_Digest C_Digest; + CK_C_DigestUpdate C_DigestUpdate; + CK_C_DigestKey C_DigestKey; + CK_C_DigestFinal C_DigestFinal; + CK_C_SignInit C_SignInit; + CK_C_Sign C_Sign; + CK_C_SignUpdate C_SignUpdate; + CK_C_SignFinal C_SignFinal; + CK_C_SignRecoverInit C_SignRecoverInit; + CK_C_SignRecover C_SignRecover; + CK_C_VerifyInit C_VerifyInit; + CK_C_Verify C_Verify; + CK_C_VerifyUpdate C_VerifyUpdate; + CK_C_VerifyFinal C_VerifyFinal; + CK_C_VerifyRecoverInit C_VerifyRecoverInit; + CK_C_VerifyRecover C_VerifyRecover; + CK_C_DigestEncryptUpdate C_DigestEncryptUpdate; + CK_C_DecryptDigestUpdate C_DecryptDigestUpdate; + CK_C_SignEncryptUpdate C_SignEncryptUpdate; + CK_C_DecryptVerifyUpdate C_DecryptVerifyUpdate; + CK_C_GenerateKey C_GenerateKey; + CK_C_GenerateKeyPair C_GenerateKeyPair; + CK_C_WrapKey C_WrapKey; + CK_C_UnwrapKey C_UnwrapKey; + CK_C_DeriveKey C_DeriveKey; + CK_C_SeedRandom C_SeedRandom; + CK_C_GenerateRandom C_GenerateRandom; + CK_C_GetFunctionStatus C_GetFunctionStatus; + CK_C_CancelFunction C_CancelFunction; + CK_C_WaitForSlotEvent C_WaitForSlotEvent; + CK_C_GetInterfaceList C_GetInterfaceList; + CK_C_GetInterface C_GetInterface; + CK_C_LoginUser C_LoginUser; + CK_C_SessionCancel C_SessionCancel; + CK_C_MessageEncryptInit C_MessageEncryptInit; + CK_C_EncryptMessage C_EncryptMessage; + CK_C_EncryptMessageBegin C_EncryptMessageBegin; + CK_C_EncryptMessageNext C_EncryptMessageNext; + CK_C_MessageEncryptFinal C_MessageEncryptFinal; + CK_C_MessageDecryptInit C_MessageDecryptInit; + CK_C_DecryptMessage C_DecryptMessage; + CK_C_DecryptMessageBegin C_DecryptMessageBegin; + CK_C_DecryptMessageNext C_DecryptMessageNext; + CK_C_MessageDecryptFinal C_MessageDecryptFinal; + CK_C_MessageSignInit C_MessageSignInit; + CK_C_SignMessage C_SignMessage; + CK_C_SignMessageBegin C_SignMessageBegin; + CK_C_SignMessageNext C_SignMessageNext; + CK_C_MessageSignFinal C_MessageSignFinal; + CK_C_MessageVerifyInit C_MessageVerifyInit; + CK_C_VerifyMessage C_VerifyMessage; + CK_C_VerifyMessageBegin C_VerifyMessageBegin; + CK_C_VerifyMessageNext C_VerifyMessageNext; + CK_C_MessageVerifyFinal C_MessageVerifyFinal; +}; + +struct CK_FUNCTION_LIST { + CK_VERSION version; + CK_C_Initialize C_Initialize; + CK_C_Finalize C_Finalize; + CK_C_GetInfo C_GetInfo; + CK_C_GetFunctionList C_GetFunctionList; + CK_C_GetSlotList C_GetSlotList; + CK_C_GetSlotInfo C_GetSlotInfo; + CK_C_GetTokenInfo C_GetTokenInfo; + CK_C_GetMechanismList C_GetMechanismList; + CK_C_GetMechanismInfo C_GetMechanismInfo; + CK_C_InitToken C_InitToken; + CK_C_InitPIN C_InitPIN; + CK_C_SetPIN C_SetPIN; + CK_C_OpenSession C_OpenSession; + CK_C_CloseSession C_CloseSession; + CK_C_CloseAllSessions C_CloseAllSessions; + CK_C_GetSessionInfo C_GetSessionInfo; + CK_C_GetOperationState C_GetOperationState; + CK_C_SetOperationState C_SetOperationState; + CK_C_Login C_Login; + CK_C_Logout C_Logout; + CK_C_CreateObject C_CreateObject; + CK_C_CopyObject C_CopyObject; + CK_C_DestroyObject C_DestroyObject; + CK_C_GetObjectSize C_GetObjectSize; + CK_C_GetAttributeValue C_GetAttributeValue; + CK_C_SetAttributeValue C_SetAttributeValue; + CK_C_FindObjectsInit C_FindObjectsInit; + CK_C_FindObjects C_FindObjects; + CK_C_FindObjectsFinal C_FindObjectsFinal; + CK_C_EncryptInit C_EncryptInit; + CK_C_Encrypt C_Encrypt; + CK_C_EncryptUpdate C_EncryptUpdate; + CK_C_EncryptFinal C_EncryptFinal; + CK_C_DecryptInit C_DecryptInit; + CK_C_Decrypt C_Decrypt; + CK_C_DecryptUpdate C_DecryptUpdate; + CK_C_DecryptFinal C_DecryptFinal; + CK_C_DigestInit C_DigestInit; + CK_C_Digest C_Digest; + CK_C_DigestUpdate C_DigestUpdate; + CK_C_DigestKey C_DigestKey; + CK_C_DigestFinal C_DigestFinal; + CK_C_SignInit C_SignInit; + CK_C_Sign C_Sign; + CK_C_SignUpdate C_SignUpdate; + CK_C_SignFinal C_SignFinal; + CK_C_SignRecoverInit C_SignRecoverInit; + CK_C_SignRecover C_SignRecover; + CK_C_VerifyInit C_VerifyInit; + CK_C_Verify C_Verify; + CK_C_VerifyUpdate C_VerifyUpdate; + CK_C_VerifyFinal C_VerifyFinal; + CK_C_VerifyRecoverInit C_VerifyRecoverInit; + CK_C_VerifyRecover C_VerifyRecover; + CK_C_DigestEncryptUpdate C_DigestEncryptUpdate; + CK_C_DecryptDigestUpdate C_DecryptDigestUpdate; + CK_C_SignEncryptUpdate C_SignEncryptUpdate; + CK_C_DecryptVerifyUpdate C_DecryptVerifyUpdate; + CK_C_GenerateKey C_GenerateKey; + CK_C_GenerateKeyPair C_GenerateKeyPair; + CK_C_WrapKey C_WrapKey; + CK_C_UnwrapKey C_UnwrapKey; + CK_C_DeriveKey C_DeriveKey; + CK_C_SeedRandom C_SeedRandom; + CK_C_GenerateRandom C_GenerateRandom; + CK_C_GetFunctionStatus C_GetFunctionStatus; + CK_C_CancelFunction C_CancelFunction; + CK_C_WaitForSlotEvent C_WaitForSlotEvent; +}; + + +#endif diff --git a/cryptoki/src/context/mod.rs b/cryptoki/src/context/mod.rs index cfa965e5..4d526053 100644 --- a/cryptoki/src/context/mod.rs +++ b/cryptoki/src/context/mod.rs @@ -43,7 +43,7 @@ pub(crate) struct Pkcs11Impl { // Even if this field is never read, it is needed for the pointers in function_list to remain // valid. _pkcs11_lib: cryptoki_sys::Pkcs11, - pub(crate) function_list: cryptoki_sys::_CK_FUNCTION_LIST, + pub(crate) function_list: cryptoki_sys::CK_FUNCTION_LIST, } impl fmt::Debug for Pkcs11Impl { diff --git a/cryptoki/src/mechanism/mechanism_info.rs b/cryptoki/src/mechanism/mechanism_info.rs index e0c757f0..8e825dd0 100644 --- a/cryptoki/src/mechanism/mechanism_info.rs +++ b/cryptoki/src/mechanism/mechanism_info.rs @@ -26,6 +26,7 @@ bitflags! { const EC_F_2M = CKF_EC_F_2M; const EC_ECPARAMETERS = CKF_EC_ECPARAMETERS; const EC_NAMEDCURVE = CKF_EC_NAMEDCURVE; + const EC_OID = CKF_EC_OID; const EC_UNCOMPRESS = CKF_EC_UNCOMPRESS; const EC_COMPRESS = CKF_EC_COMPRESS; } @@ -182,7 +183,7 @@ impl MechanismInfo { /// /// **[Conformance](crate#conformance-notes):** /// *At least* one of [`ec_from_parameters`](Self::ec_from_parameters) and - /// [`ec_from_named_curve`](Self::ec_from_named_curve) must be `true` + /// [`ec_from_oid`](Self::ec_from_oid) must be `true` pub fn ec_from_parameters(&self) -> bool { self.flags.contains(MechanismInfoFlags::EC_ECPARAMETERS) } @@ -193,10 +194,21 @@ impl MechanismInfo { /// **[Conformance](crate#conformance-notes):** /// *At least* one of [`ec_from_parameters`](Self::ec_from_parameters) and /// [`ec_from_named_curve`](Self::ec_from_named_curve) must be `true` + #[deprecated = "use `ec_from_oid` instead"] pub fn ec_from_named_curve(&self) -> bool { self.flags.contains(MechanismInfoFlags::EC_NAMEDCURVE) } + /// True if the mechanism supports specifying elliptic curve domain + /// parameters with an oid + /// + /// **[Conformance](crate#conformance-notes):** + /// *At least* one of [`ec_from_parameters`](Self::ec_from_parameters) and + /// [`ec_from_oid`](Self::ec_from_oid) must be `true` + pub fn ec_from_oid(&self) -> bool { + self.flags.contains(MechanismInfoFlags::EC_OID) + } + /// True if the mechanism can be used with elliptic curve points in /// uncompressed form /// @@ -257,7 +269,7 @@ mod test { HW | ENCRYPT | DECRYPT | DIGEST | SIGN | SIGN_RECOVER | VERIFY | \ VERIFY_RECOVER | GENERATE | GENERATE_KEY_PAIR | WRAP | UNWRAP | DERIVE | \ EXTENSION | EC_F_P | EC_F_2M | EC_ECPARAMETERS | EC_NAMEDCURVE | \ -EC_UNCOMPRESS | EC_COMPRESS"; +EC_OID | EC_UNCOMPRESS | EC_COMPRESS"; let all = MechanismInfoFlags::all(); let observed = format!("{all:#?}"); println!("{observed}");