Fix implementation of exportable flag.
[platform/core/security/key-manager.git] / src / manager / client-capi / ckmc-type.cpp
index 9b25446..c02bf7f 100644 (file)
 
 
 #include <string.h>
+#include <stdio.h>
 #include <stdlib.h>
+#include <ckm/ckm-type.h>
 #include <ckmc/ckmc-type.h>
 #include <ckmc/ckmc-error.h>
+#include <ckmc-type-converter.h>
 #include <openssl/x509v3.h>
 #include <openssl/pkcs12.h>
 #include <openssl/evp.h>
 #include <openssl/pem.h>
 
-int _ckm_load_cert_from_x509(X509 *xCert, ckm_cert **cert);
-
+int _ckmc_load_cert_from_x509(X509 *xCert, ckmc_cert_s **cert);
 
 KEY_MANAGER_CAPI
-ckm_key *ckm_key_new(unsigned char *raw_key, unsigned int key_size, ckm_key_type key_type, char *password)
+int ckmc_key_new(unsigned char *raw_key, size_t key_size, ckmc_key_type_e key_type, char *password, ckmc_key_s **ppkey)
 {
-       ckm_key *pkey = new ckm_key;
-       if(pkey == NULL)
-               return NULL;
+       ckmc_key_s *pkey;
+
+       if(raw_key == NULL || key_size <= 0 || ppkey == NULL) {
+               return CKMC_ERROR_INVALID_PARAMETER;
+       }
 
+       pkey = new ckmc_key_s;
+       if(pkey == NULL) {
+               return CKMC_ERROR_OUT_OF_MEMORY;
+       }
        pkey->raw_key = reinterpret_cast<unsigned char*>(malloc(key_size));
        if(pkey->raw_key == NULL) {
                free(pkey);
-               return NULL;
+               return CKMC_ERROR_OUT_OF_MEMORY;
        }
        memcpy(pkey->raw_key, raw_key, key_size);
 
@@ -55,7 +63,7 @@ ckm_key *ckm_key_new(unsigned char *raw_key, unsigned int key_size, ckm_key_type
                if(pkey->password == NULL) {
                        free(pkey);
                        free(pkey->raw_key);
-                       return NULL;
+                       return CKMC_ERROR_OUT_OF_MEMORY;
                }
                memset(pkey->password, 0, strlen(password) +1);
                strncpy(pkey->password, password, strlen(password));
@@ -63,81 +71,101 @@ ckm_key *ckm_key_new(unsigned char *raw_key, unsigned int key_size, ckm_key_type
                pkey->password = NULL;
        }
 
-       return pkey;
+       *ppkey = pkey;
+
+       return CKMC_ERROR_NONE;
 }
 
 KEY_MANAGER_CAPI
-void ckm_key_free(ckm_key *key)
+void ckmc_key_free(ckmc_key_s *key)
 {
        if(key == NULL)
                return;
 
        if(key->password != NULL)
                free(key->password);
-       if(key->raw_key != NULL)
+       if(key->raw_key != NULL) {
+               memset(key->raw_key, 0, key->key_size);
                free(key->raw_key);
+       }
 
        free(key);
 }
 
 KEY_MANAGER_CAPI
-ckm_raw_buffer * ckm_buffer_new(unsigned char *data, unsigned int size)
+int ckmc_buffer_new(unsigned char *data, size_t size,ckmc_raw_buffer_s **ppbuffer)
 {
-       ckm_raw_buffer *pbuff = new ckm_raw_buffer;
+       ckmc_raw_buffer_s *pbuff;
+
+       if(data == NULL || size <= 0 || ppbuffer == NULL) {
+               return CKMC_ERROR_INVALID_PARAMETER;
+       }
+
+       pbuff = new ckmc_raw_buffer_s;
        if(pbuff == NULL)
-                       return NULL;
+                       return CKMC_ERROR_OUT_OF_MEMORY;
 
        pbuff->data = reinterpret_cast<unsigned char*>(malloc(size));
        if(pbuff->data == NULL) {
                free(pbuff);
-               return NULL;
+               return CKMC_ERROR_OUT_OF_MEMORY;
        }
        memcpy(pbuff->data, data, size);
 
        pbuff->size = size;
+       *ppbuffer = pbuff;
 
-       return pbuff;
+       return CKMC_ERROR_NONE;
 }
 
 KEY_MANAGER_CAPI
-void ckm_buffer_free(ckm_raw_buffer *buffer)
+void ckmc_buffer_free(ckmc_raw_buffer_s *buffer)
 {
        if(buffer == NULL)
                return;
 
-       if(buffer->data != NULL)
+       if(buffer->data != NULL) {
+               memset(buffer->data, 0, buffer->size);
                free(buffer->data);
+       }
        free(buffer);
 }
 
 KEY_MANAGER_CAPI
-ckm_cert *ckm_cert_new(unsigned char *raw_cert, unsigned int cert_size, ckm_cert_form data_format)
+int ckmc_cert_new(unsigned char *raw_cert, size_t cert_size, ckmc_data_format_e data_format, ckmc_cert_s **ppcert)
 {
-       ckm_cert *pcert = new ckm_cert;
-       if(pcert == NULL)
-               return NULL;
+       ckmc_cert_s *pcert;
+
+       if(raw_cert == NULL || cert_size <= 0 || ppcert == NULL) {
+               return CKMC_ERROR_INVALID_PARAMETER;
+       }
 
+       pcert = new ckmc_cert_s;
+       if(pcert == NULL) {
+               return CKMC_ERROR_OUT_OF_MEMORY;
+       }
        pcert->raw_cert = reinterpret_cast<unsigned char*>(malloc(cert_size));
        if(pcert->raw_cert == NULL) {
                free(pcert);
-               return NULL;
+               return CKMC_ERROR_OUT_OF_MEMORY;
        }
        memcpy(pcert->raw_cert, raw_cert, cert_size);
 
        pcert->cert_size = cert_size;
        pcert->data_format = data_format;
 
-       return pcert;
+       *ppcert = pcert;
+       return CKMC_ERROR_NONE;
 }
 
 KEY_MANAGER_CAPI
-int ckm_load_cert_from_file(const char *file_path, ckm_cert **cert)
+int ckmc_load_cert_from_file(const char *file_path, ckmc_cert_s **cert)
 {
        OpenSSL_add_all_algorithms();
 
        FILE *fp = fopen(file_path, "r");
        if(fp == NULL)
-               return KEY_MANAGER_API_ERROR_FILE_ACCESS_DENIED;
+               return CKMC_ERROR_FILE_ACCESS_DENIED;
        X509 *pcert = NULL;
        if(!(pcert = d2i_X509_fp(fp, NULL))) {
                fseek(fp, 0, SEEK_SET);
@@ -145,18 +173,18 @@ int ckm_load_cert_from_file(const char *file_path, ckm_cert **cert)
        }
        fclose(fp);
        if(pcert == NULL) {
-               return KEY_MANAGER_API_ERROR_INVALID_FORMAT;
+               return CKMC_ERROR_INVALID_FORMAT;
        }
 
-       int ret = _ckm_load_cert_from_x509(pcert, cert);
-       if(ret != KEY_MANAGER_API_SUCCESS) {
+       int ret = _ckmc_load_cert_from_x509(pcert, cert);
+       if(ret != CKMC_ERROR_NONE) {
                X509_free(pcert);
        }
        return ret;
 }
 
 KEY_MANAGER_CAPI
-int ckm_load_from_pkcs12_file(const char *file_path, const char *passphrase, ckm_key **private_key, ckm_cert **ckmcert, ckm_cert_list **ca_cert_list)
+int ckmc_load_from_pkcs12_file(const char *file_path, const char *passphrase, ckmc_key_s **private_key, ckmc_cert_s **ckmcert, ckmc_cert_list_s **ca_cert_list)
 {
        class Pkcs12Converter {
        private:
@@ -166,11 +194,11 @@ int ckm_load_from_pkcs12_file(const char *file_path, const char *passphrase, ckm
                X509* x509Cert;
                STACK_OF(X509)* ca;
 
-       public:
                int ret;
-               ckm_key *retPrivateKey;
-               ckm_cert *retCkmCert;
-               ckm_cert_list *retCaCertList;
+       public:
+               ckmc_key_s *retPrivateKey;
+               ckmc_cert_s *retCkmCert;
+               ckmc_cert_list_s *retCaCertList;
 
                Pkcs12Converter(){
                        fp_in = NULL;
@@ -178,7 +206,7 @@ int ckm_load_from_pkcs12_file(const char *file_path, const char *passphrase, ckm
                        pkey = NULL;
                        x509Cert = NULL;
                        ca = NULL;
-                       ret = KEY_MANAGER_API_SUCCESS;
+                       ret = CKMC_ERROR_NONE;
                        retPrivateKey = NULL;
                        retCkmCert = NULL;
                        retCaCertList = NULL;
@@ -196,149 +224,182 @@ int ckm_load_from_pkcs12_file(const char *file_path, const char *passphrase, ckm
                                sk_X509_pop_free(ca, X509_free);
                        EVP_cleanup();
 
-                       if(ret != KEY_MANAGER_API_SUCCESS) {
-                               if(retPrivateKey != NULL)
-                                       ckm_key_free(retPrivateKey);
-                               if(retCkmCert != NULL)
-                                       ckm_cert_free(retCkmCert);
-                               if(retCaCertList != NULL)
-                                       ckm_cert_list_free(retCaCertList);
+                       if(ret != CKMC_ERROR_NONE) {
+                               if(retPrivateKey != NULL){
+                                       ckmc_key_free(retPrivateKey);
+                                       retPrivateKey = NULL;
+                               }
+                               if(retCkmCert != NULL) {
+                                       ckmc_cert_free(retCkmCert);
+                                       retCkmCert = NULL;
+                               }
+                               if(retCaCertList != NULL) {
+                                       ckmc_cert_list_all_free(retCaCertList);
+                                       retCaCertList = NULL;
+                               }
                        }
                };
 
                int parsePkcs12(const char *filePath, const char *pass) {
                        fp_in = NULL;
                        if(!(fp_in = fopen(filePath, "rb"))) {
-                               return KEY_MANAGER_API_ERROR_FILE_ACCESS_DENIED;
+                               return CKMC_ERROR_FILE_ACCESS_DENIED;
                        }
 
                        if(!(p12 = d2i_PKCS12_fp(fp_in, NULL))) {
-                               return KEY_MANAGER_API_ERROR_INVALID_FORMAT;
+                               return CKMC_ERROR_INVALID_FORMAT;
                        }
 
                        /* parse PKCS#12 certificate */
                        if((ret = PKCS12_parse(p12, pass, &pkey, &x509Cert, &ca)) != 1) {
-                               return KEY_MANAGER_API_ERROR_INVALID_FORMAT;
+                               return CKMC_ERROR_INVALID_FORMAT;
                        }
-                       return KEY_MANAGER_API_SUCCESS;
+                       return CKMC_ERROR_NONE;
                }
 
                int toCkmCert() {
-                       if( (ret =_ckm_load_cert_from_x509(x509Cert,&retCkmCert)) != KEY_MANAGER_API_SUCCESS) {
+                       if( (ret =_ckmc_load_cert_from_x509(x509Cert,&retCkmCert)) != CKMC_ERROR_NONE) {
                                return ret;
                        }
-                       return KEY_MANAGER_API_SUCCESS;
+                       return CKMC_ERROR_NONE;
                }
 
                int toCkmKey() {
-                       int prikeyLen = 0;
-                       if((prikeyLen = i2d_PrivateKey(pkey, NULL)) < 0) {
-                               return KEY_MANAGER_API_ERROR_OUT_OF_MEMORY;
-                       }
-                       unsigned char arrayPrikey[sizeof(unsigned char) * prikeyLen];
-                       unsigned char *pPrikey = arrayPrikey;
-                       if((prikeyLen = i2d_PrivateKey(pkey, &pPrikey)) < 0) {
-                               return KEY_MANAGER_API_ERROR_OUT_OF_MEMORY;
-                       }
+                       BIO *bkey = BIO_new(BIO_s_mem());
+
+                       i2d_PrivateKey_bio(bkey, pkey);
+
+                   CKM::RawBuffer output(8196);
+                   int size = BIO_read(bkey, output.data(), output.size());
+                       BIO_free_all(bkey);
+                   if (size <= 0) {
+                       return CKMC_ERROR_INVALID_FORMAT;
+                   }
+                   output.resize(size);
 
                        int type = EVP_PKEY_type(pkey->type);
-                       ckm_key_type key_type = CKM_KEY_NONE;
+                       ckmc_key_type_e key_type = CKMC_KEY_NONE;
                        switch(type) {
                        case EVP_PKEY_RSA :
-                               key_type = CKM_KEY_RSA_PRIVATE;
+                               key_type = CKMC_KEY_RSA_PRIVATE;
                                break;
                        case EVP_PKEY_EC :
-                               key_type = CKM_KEY_ECDSA_PRIVATE;
+                               key_type = CKMC_KEY_ECDSA_PRIVATE;
                                break;
                        }
-                       if(key_type == CKM_KEY_NONE) {
-                               return KEY_MANAGER_API_ERROR_INVALID_FORMAT;
+                       if(key_type == CKMC_KEY_NONE) {
+                               return CKMC_ERROR_INVALID_FORMAT;
                        }
 
                        char *nullPassword = NULL;
-                       retPrivateKey = ckm_key_new(pPrikey, sizeof(unsigned char) * prikeyLen, key_type, nullPassword);
 
-                       return KEY_MANAGER_API_SUCCESS;
+                       return ckmc_key_new(output.data(), size, key_type, nullPassword, &retPrivateKey);
                }
 
                int toCaCkmCertList() {
+                       int tmpRet;
                        X509* popedCert = NULL;
-                       ckm_cert *popedCkmCert = NULL;
-                       ckm_cert_list *tmpCertList = NULL;
-                       retCaCertList = tmpCertList;
+                       ckmc_cert_s *popedCkmCert = NULL;
+                       ckmc_cert_list_s *tmpCertList = NULL;
                        while((popedCert = sk_X509_pop(ca)) != NULL) {
-                               if( (ret =_ckm_load_cert_from_x509(popedCert, &popedCkmCert)) != KEY_MANAGER_API_SUCCESS) {
-                                       return KEY_MANAGER_API_ERROR_OUT_OF_MEMORY;
+                               if( (tmpRet =_ckmc_load_cert_from_x509(popedCert, &popedCkmCert)) != CKMC_ERROR_NONE) {
+                                       return CKMC_ERROR_OUT_OF_MEMORY;
+                               }
+                               if(tmpCertList == NULL) { // first
+                                       tmpRet = ckmc_cert_list_new(popedCkmCert, &tmpCertList);
+                                       retCaCertList = tmpCertList;
+                               }else {
+                                       tmpRet = ckmc_cert_list_add(tmpCertList, popedCkmCert, &tmpCertList);
+                               }
+                               if(tmpRet != CKMC_ERROR_NONE) {
+                                       ckmc_cert_list_all_free(retCaCertList);
+                                       retCaCertList = NULL;
+                                       return tmpRet;
                                }
-                               tmpCertList = ckm_cert_list_add(tmpCertList, popedCkmCert);
                        }
-                       return KEY_MANAGER_API_SUCCESS;
+                       return CKMC_ERROR_NONE;
                }
 
        };
 
-       int ret = KEY_MANAGER_API_SUCCESS;
+       OpenSSL_add_all_algorithms();
+
+       int ret = CKMC_ERROR_NONE;
 
        Pkcs12Converter converter;
-       if((ret = converter.parsePkcs12(file_path, passphrase)) != KEY_MANAGER_API_SUCCESS) {
+       if((ret = converter.parsePkcs12(file_path, passphrase)) != CKMC_ERROR_NONE) {
                return ret;
        }
-       if((ret = converter.toCkmCert()) != KEY_MANAGER_API_SUCCESS) {
+       if((ret = converter.toCkmCert()) != CKMC_ERROR_NONE) {
                return ret;
        }
-       if((ret = converter.toCkmKey()) != KEY_MANAGER_API_SUCCESS) {
+       if((ret = converter.toCkmKey()) != CKMC_ERROR_NONE) {
                return ret;
        }
-       if((ret = converter.toCaCkmCertList()) != KEY_MANAGER_API_SUCCESS) {
+       if((ret = converter.toCaCkmCertList()) != CKMC_ERROR_NONE) {
                return ret;
        }
+
        *private_key = converter.retPrivateKey;
        *ckmcert = converter.retCkmCert;
        *ca_cert_list = converter.retCaCertList;
 
-       return KEY_MANAGER_API_SUCCESS;
+       return CKMC_ERROR_NONE;
 }
 
 KEY_MANAGER_CAPI
-void ckm_cert_free(ckm_cert *cert)
+void ckmc_cert_free(ckmc_cert_s *cert)
 {
        if(cert == NULL)
                return;
 
-       if(cert->raw_cert != NULL)
+       if(cert->raw_cert != NULL) {
+               memset(cert->raw_cert, 0, cert->cert_size);
                free(cert->raw_cert);
+       }
        free(cert);
 }
 
 KEY_MANAGER_CAPI
-ckm_alias_list *ckm_alias_list_new(char *alias)
+int ckmc_alias_list_new(char *alias, ckmc_alias_list_s **ppalias_list)
 {
-       ckm_alias_list *previous = NULL;
-       return ckm_alias_list_add(previous, alias);
+       ckmc_alias_list_s *previous = NULL;
+       return ckmc_alias_list_add(previous, alias, ppalias_list);
 }
 
 KEY_MANAGER_CAPI
-ckm_alias_list *ckm_alias_list_add(ckm_alias_list *previous, char *alias)
+int ckmc_alias_list_add(ckmc_alias_list_s *previous, char *alias, ckmc_alias_list_s **pplast)
 {
-       ckm_alias_list *plist = new ckm_alias_list;
+       ckmc_alias_list_s *plist;
+
+       if(alias == NULL || pplast == NULL) {
+               return CKMC_ERROR_INVALID_PARAMETER;
+       }
+
+       plist = new ckmc_alias_list_s;
+       if(plist == NULL) {
+               return CKMC_ERROR_OUT_OF_MEMORY;
+       }
 
        plist->alias = alias;
        plist->next = NULL;
 
-       if(previous != NULL)
+       if(previous != NULL) {
                previous->next = plist;
+       }
+       *pplast = plist;
 
-       return plist;
+       return CKMC_ERROR_NONE;
 }
 
 KEY_MANAGER_CAPI
-void ckm_alias_list_free(ckm_alias_list *first)
+void ckmc_alias_list_free(ckmc_alias_list_s *first)
 {
        if(first == NULL)
                return;
 
-       ckm_alias_list *current = NULL;
-       ckm_alias_list *next = first;
+       ckmc_alias_list_s *current = NULL;
+       ckmc_alias_list_s *next = first;
        do {
                current = next;
                next = current->next;
@@ -347,13 +408,12 @@ void ckm_alias_list_free(ckm_alias_list *first)
 }
 
 KEY_MANAGER_CAPI
-void ckm_alias_list_all_free(ckm_alias_list *first)
+void ckmc_alias_list_all_free(ckmc_alias_list_s *first)
 {
        if(first == NULL)
                return;
-
-       ckm_alias_list *current = NULL;
-       ckm_alias_list *next = first;
+       ckmc_alias_list_s *current = NULL;
+       ckmc_alias_list_s *next = first;
        do {
                current = next;
                next = current->next;
@@ -365,34 +425,45 @@ void ckm_alias_list_all_free(ckm_alias_list *first)
 }
 
 KEY_MANAGER_CAPI
-ckm_cert_list *ckm_cert_list_new(ckm_cert *cert)
+int ckmc_cert_list_new(ckmc_cert_s *cert, ckmc_cert_list_s **ppalias_list)
 {
-       ckm_cert_list *previous = NULL;
-       return ckm_cert_list_add(previous, cert);
+       ckmc_cert_list_s *previous = NULL;
+       return ckmc_cert_list_add(previous, cert, ppalias_list);
 }
 
 KEY_MANAGER_CAPI
-ckm_cert_list *ckm_cert_list_add(ckm_cert_list *previous, ckm_cert *cert)
+int ckmc_cert_list_add(ckmc_cert_list_s *previous, ckmc_cert_s *cert, ckmc_cert_list_s **pplast)
 {
-       ckm_cert_list *plist = new ckm_cert_list;
+       ckmc_cert_list_s *plist;
 
+       if(cert == NULL || pplast == NULL) {
+               return CKMC_ERROR_INVALID_PARAMETER;
+       }
+
+       plist = new ckmc_cert_list_s;
+       if(plist == NULL) {
+               return CKMC_ERROR_OUT_OF_MEMORY;
+       }
        plist->cert = cert;
        plist->next = NULL;
 
-       if(previous != NULL)
+       if(previous != NULL) {
                previous->next = plist;
+       }
+
+       *pplast = plist;
 
-       return plist;
+       return CKMC_ERROR_NONE;
 }
 
 KEY_MANAGER_CAPI
-void ckm_cert_list_free(ckm_cert_list *first)
+void ckmc_cert_list_free(ckmc_cert_list_s *first)
 {
        if(first == NULL)
                return;
 
-       ckm_cert_list *current = NULL;
-       ckm_cert_list *next = first;
+       ckmc_cert_list_s *current = NULL;
+       ckmc_cert_list_s *next = first;
        do {
                current = next;
                next = current->next;
@@ -401,41 +472,67 @@ void ckm_cert_list_free(ckm_cert_list *first)
 }
 
 KEY_MANAGER_CAPI
-void ckm_cert_list_all_free(ckm_cert_list *first)
+void ckmc_cert_list_all_free(ckmc_cert_list_s *first)
 {
        if(first == NULL)
                return;
 
-       ckm_cert_list *current = NULL;
-       ckm_cert_list *next = first;
+       ckmc_cert_list_s *current = NULL;
+       ckmc_cert_list_s *next = first;
        do {
                current = next;
                next = current->next;
                if((current->cert)!=NULL) {
-                       ckm_cert_free(current->cert);
+                       ckmc_cert_free(current->cert);
                }
                free(current);
        }while(next != NULL);
 }
 
-int _ckm_load_cert_from_x509(X509 *xCert, ckm_cert **cert)
+int _ckmc_load_cert_from_x509(X509 *xCert, ckmc_cert_s **cert)
 {
-       int certLen;
-       unsigned char* bufCert = NULL;
-
        if(xCert == NULL) {
-               return KEY_MANAGER_API_ERROR_INVALID_FORMAT;
+               return CKMC_ERROR_INVALID_FORMAT;
        }
 
-       /* load certificate into buffer */
-       if((certLen = i2d_X509(xCert, NULL)) < 0) {
-               return KEY_MANAGER_API_ERROR_INVALID_FORMAT;
-       }
-       unsigned char arrayCert[sizeof(unsigned char) * certLen];
-       bufCert = arrayCert;
-       i2d_X509(xCert, &bufCert);
+       BIO *bcert = BIO_new(BIO_s_mem());
+
+       i2d_X509_bio(bcert, xCert);
 
-       *cert = ckm_cert_new(bufCert, certLen, CKM_CERT_FORM_DER);
+    CKM::RawBuffer output(8196);
+    int size = BIO_read(bcert, output.data(), output.size());
+       BIO_free_all(bcert);
+    if (size <= 0) {
+        return CKMC_ERROR_INVALID_FORMAT;
+    }
+    output.resize(size);
 
-       return KEY_MANAGER_API_SUCCESS;
+       return ckmc_cert_new(output.data(), output.size(), CKMC_FORM_DER, cert);
+}
+
+int to_ckmc_error(int ckm_error) {
+       switch(ckm_error) {
+       case CKM_API_SUCCESS:                     return CKMC_ERROR_NONE;
+       case CKM_API_ERROR_SOCKET:                return CKMC_ERROR_SOCKET;
+       case CKM_API_ERROR_BAD_REQUEST:           return CKMC_ERROR_BAD_REQUEST;
+       case CKM_API_ERROR_BAD_RESPONSE:          return CKMC_ERROR_BAD_RESPONSE;
+       case CKM_API_ERROR_SEND_FAILED:           return CKMC_ERROR_SEND_FAILED;
+       case CKM_API_ERROR_RECV_FAILED:           return CKMC_ERROR_RECV_FAILED;
+       case CKM_API_ERROR_AUTHENTICATION_FAILED: return CKMC_ERROR_AUTHENTICATION_FAILED;
+       case CKM_API_ERROR_INPUT_PARAM:           return CKMC_ERROR_INVALID_PARAMETER;
+       case CKM_API_ERROR_BUFFER_TOO_SMALL:      return CKMC_ERROR_BUFFER_TOO_SMALL;
+       case CKM_API_ERROR_OUT_OF_MEMORY:         return CKMC_ERROR_OUT_OF_MEMORY;
+       case CKM_API_ERROR_ACCESS_DENIED:         return CKMC_ERROR_PERMISSION_DENIED;
+       case CKM_API_ERROR_SERVER_ERROR:          return CKMC_ERROR_SERVER_ERROR;
+       case CKM_API_ERROR_DB_LOCKED:             return CKMC_ERROR_DB_LOCKED;
+       case CKM_API_ERROR_DB_ERROR:              return CKMC_ERROR_DB_ERROR;
+       case CKM_API_ERROR_DB_ALIAS_EXISTS:       return CKMC_ERROR_DB_ALIAS_EXISTS;
+       case CKM_API_ERROR_DB_ALIAS_UNKNOWN:      return CKMC_ERROR_DB_ALIAS_UNKNOWN;
+       case CKM_API_ERROR_VERIFICATION_FAILED:   return CKMC_ERROR_VERIFICATION_FAILED;
+       case CKM_API_ERROR_INVALID_FORMAT:        return CKMC_ERROR_INVALID_FORMAT;
+       case CKM_API_ERROR_FILE_ACCESS_DENIED:    return CKMC_ERROR_FILE_ACCESS_DENIED;
+    case CKM_API_ERROR_NOT_EXPORTABLE:        return CKMC_ERROR_NOT_EXPORTABLE;
+       case CKM_API_ERROR_UNKNOWN:               return CKMC_ERROR_UNKNOWN;
+       }
+       return CKMC_ERROR_UNKNOWN;
 }