int ret;
ckmc_cert_list_s *start = NULL;
ckmc_cert_list_s *plist = NULL;
- CKM::CertificateShPtrVector::const_iterator it;
- for(it = certVector.begin(); it != certVector.end(); it++) {
- CKM::RawBuffer rawBuffer = (*it)->getDER();
+ for(const auto &e : certVector) {
+ CKM::RawBuffer rawBuffer = e->getDER();
ckmc_cert_s *pcert = NULL;
ret = ckmc_cert_new(rawBuffer.data(), rawBuffer.size(), CKMC_FORM_DER, &pcert);
if(pcert == NULL) {
CKM::RawBuffer&);
int _cryptoOperation(cryptoFn operation,
- const ckmc_param_list_s *params,
+ ckmc_param_list_h params,
const char *key_alias,
const char *password,
const ckmc_raw_buffer_s in,
}
KEY_MANAGER_CAPI
-int ckmc_create_key_aes(const size_t size,
+int ckmc_create_key_aes(size_t size,
const char *key_alias,
- const ckmc_policy_s key_policy)
+ ckmc_policy_s key_policy)
{
CKM::ManagerShPtr mgr = CKM::Manager::create();
return CKMC_ERROR_INVALID_PARAMETER;
}
- int ret = CKMC_ERROR_UNKNOWN;
int tmpOcspStatus = -1;
CKM::ManagerShPtr mgr = CKM::Manager::create();
CKM::CertificateShPtrVector ckmCertChain = _toCkmCertificateVector(pcert_chain_list);
- ret = mgr->ocspCheck(ckmCertChain, tmpOcspStatus);
+ int ret = mgr->ocspCheck(ckmCertChain, tmpOcspStatus);
*ocsp_status = to_ckmc_ocsp_status(tmpOcspStatus);
return to_ckmc_error(ret);
}
}
KEY_MANAGER_CAPI
-int ckmc_encrypt_data(const ckmc_param_list_s *params,
+int ckmc_encrypt_data(ckmc_param_list_h params,
const char *key_alias,
const char *password,
const ckmc_raw_buffer_s decrypted,
}
KEY_MANAGER_CAPI
-int ckmc_decrypt_data(const ckmc_param_list_s *params,
+int ckmc_decrypt_data(ckmc_param_list_h params,
const char *key_alias,
const char *password,
const ckmc_raw_buffer_s encrypted,