* Moved client-certificate-impl and client-key-impl to common library.
* Changed client-certificate-impl into certificate-impl.
* Changed name client-key-impl int key-impl.
Change-Id: I2a49685f4a885300c6f438a284aac8d180ab752d
)
SET(KEY_MANAGER_CLIENT_SOURCES
+ ${KEY_MANAGER_CLIENT_SRC_PATH}/client-certificate.cpp
${KEY_MANAGER_CLIENT_SRC_PATH}/client-control.cpp
${KEY_MANAGER_CLIENT_SRC_PATH}/client-common.cpp
${KEY_MANAGER_CLIENT_SRC_PATH}/client-echo.cpp
+ ${KEY_MANAGER_CLIENT_SRC_PATH}/client-key.cpp
${KEY_MANAGER_CLIENT_SRC_PATH}/client-manager.cpp
${KEY_MANAGER_CLIENT_SRC_PATH}/client-manager-impl.cpp
)
KEY_AES
};
+enum class DataFormat : int {
+ FORM_DER_BASE64,
+ FORM_DER,
+ FORM_PEM
+};
+
+enum class ElipticCurve : int {
+ prime192v1,
+ prime256v1,
+ secp384r1
+};
+
struct Policy {
Policy(const std::string &pass = std::string(), bool extract = true, bool rest = false)
: password(pass)
class Key {
public:
- enum class ECType : unsigned int {
- prime192v1,
- prime256v1,
- secp384r1
- };
-
Key();
Key(const RawBuffer &rawData, KeyType type, const std::string &password = std::string()); // Import key
Key(const Key &key);
bool empty() const;
KeyType getType() const;
int getSize() const;
- ECType getCurve() const;
+ ElipticCurve getCurve() const;
RawBuffer getKey() const;
KeyImpl* getImpl() const;
// FINGERPRINT_SHA256
// };
- enum class Format : unsigned int {
- FORM_BASE64,
- FORM_DER
- };
-
Certificate();
- Certificate(const RawBuffer &rawData, Format format);
+ Certificate(const RawBuffer &rawData, DataFormat format);
Certificate(const Certificate &certificate);
Certificate& operator=(const Certificate &certificate);
SET(COMMON_PATH ${PROJECT_SOURCE_DIR}/src/manager)
SET(COMMON_SOURCES
+ ${COMMON_PATH}/common/base64.cpp
${COMMON_PATH}/common/protocols.cpp
${COMMON_PATH}/common/message-buffer.cpp
${COMMON_PATH}/common/smack-check.cpp
- ${COMMON_PATH}/common/Base64.cpp
- ${COMMON_PATH}/common/client-certificate.cpp
- ${COMMON_PATH}/common/client-certificate-impl.cpp
- ${COMMON_PATH}/common/client-key.cpp
- ${COMMON_PATH}/common/client-key-impl.cpp
+ ${COMMON_PATH}/common/certificate-impl.cpp
+ ${COMMON_PATH}/common/key-impl.cpp
${COMMON_PATH}/dpl/log/src/abstract_log_provider.cpp
${COMMON_PATH}/dpl/log/src/dlog_log_provider.cpp
${COMMON_PATH}/dpl/log/src/log.cpp
#include <ckm/key-manager.h>
-#include <client-certificate-impl.h>
+#include <certificate-impl.h>
namespace CKM {
Certificate::Certificate(){}
-Certificate::Certificate(const RawBuffer &rawData, Format format)
+Certificate::Certificate(const RawBuffer &rawData, DataFormat format)
: m_impl(new CertificateImpl(rawData, format))
{}
#include <ckm/ckm-type.h>
#include <ckm/key-manager.h>
-#include <client-key-impl.h>
+#include <key-impl.h>
namespace CKM {
#include <client-manager-impl.h>
#include <client-common.h>
-#include <client-key-impl.h>
+#include <key-impl.h>
#include <message-buffer.h>
#include <protocols.h>
if (recvDataType != DBDataType::CERTIFICATE)
return KEY_MANAGER_API_ERROR_BAD_RESPONSE;
- Certificate certParsed(rawData, Certificate::Format::FORM_DER);
+ Certificate certParsed(rawData, DataFormat::FORM_DER);
if (certParsed.empty())
return KEY_MANAGER_API_ERROR_BAD_RESPONSE;
#include <dpl/log/log.h>
-#include <Base64.h>
+#include <base64.h>
namespace CKM {
#include <dpl/log/log.h>
-#include <client-certificate-impl.h>
-#include <Base64.h>
+#include <certificate-impl.h>
+#include <base64.h>
namespace CKM {
-CertificateImpl::CertificateImpl(const RawBuffer &der, Certificate::Format format) {
+CertificateImpl::CertificateImpl(const RawBuffer &der, DataFormat format) {
int size;
const unsigned char *ptr;
RawBuffer tmp;
- if (Certificate::Format::FORM_BASE64 == format) {
+ if (DataFormat::FORM_DER_BASE64 == format) {
Base64Decoder base64;
base64.reset();
base64.append(der);
#include <memory>
#include <vector>
#include <ckm/ckm-type.h>
-#include <ckm/key-manager.h>
extern "C" {
struct x509_st;
class CertificateImpl {
public:
CertificateImpl(){}
- CertificateImpl(const RawBuffer &data, Certificate::Format format);
+ CertificateImpl(const RawBuffer &data, DataFormat format);
CertificateImpl& operator=(const CertificateImpl &);
RawBuffer getDER() const;
bool empty() const;
#include <openssl/bio.h>
#include <openssl/pem.h>
-#include <client-key-impl.h>
+#include <key-impl.h>
namespace {
*/
#pragma once
-//#include <dpl/serialization.h>
-
#include <ckm/ckm-type.h>
-#include <ckm/key-manager.h>
namespace CKM {
#include <openssl/x509v3.h>
#include <openssl/obj_mac.h>
#include <ckm/ckm-type.h>
-#include <client-key-impl.h>
+#include <key-impl.h>
#include <CryptoService.h>
#include <key-manager-util.h>
return CKM_CRYPTO_CREATEKEY_SUCCESS;
}
-int CryptoService::createKeyPairECDSA(const Key::ECType type,
+int CryptoService::createKeyPairECDSA(ElipticCurve type,
KeyImpl &createdPrivateKey, // returned value
KeyImpl &createdPublicKey) // returned value
{
RawBuffer priKey_tmp, pubKey_tmp, null_password;
switch(type) {
- case Key::ECType::prime192v1:
- ecCurve = NID_X9_62_prime192v1;
+ case ElipticCurve::prime192v1:
+ ecCurve = NID_X9_62_prime192v1;
break;
- case Key::ECType::prime256v1:
- ecCurve = NID_X9_62_prime256v1;
+ case ElipticCurve::prime256v1:
+ ecCurve = NID_X9_62_prime256v1;
break;
- case Key::ECType::secp384r1:
- ecCurve = NID_secp384r1;
+ case ElipticCurve::secp384r1:
+ ecCurve = NID_secp384r1;
break;
}
RawBuffer tmpBuf;
for(unsigned int i=0;i<chain.size();i++) {
x509ToRawBuffer(tmpBuf, chain[i]);
- CertificateImpl tmpCertImpl((const RawBuffer)tmpBuf,Certificate::Format::FORM_DER);
+ CertificateImpl tmpCertImpl((const RawBuffer)tmpBuf, DataFormat::FORM_DER);
certificateChainVector.push_back(tmpCertImpl);
}
#include <iostream>
-#include <client-key-impl.h>
-#include <client-certificate-impl.h>
-#include <ckm/key-manager.h>
+#include <key-impl.h>
+#include <certificate-impl.h>
#include <ckm/ckm-type.h>
#include <string.h>
#include <vector>
KeyImpl &createdPrivateKey, // returned value ==> Key &createdPrivateKey,
KeyImpl &createdPublicKey); // returned value ==> Key &createdPublicKey
- int createKeyPairECDSA(const Key::ECType type1,
+ int createKeyPairECDSA(ElipticCurve type1,
KeyImpl &createdPrivateKey, // returned value
KeyImpl &createdPublicKey); // returned value
#include <openssl/sha.h>
#include <dpl/log/log.h>
-#include <Base64.h>
+#include <base64.h>
#include <DBCryptoModule.h>
#include <ckm-service.h>
#include <ckm-logic.h>
-#include <client-key-impl.h>
+#include <key-impl.h>
namespace {
const CKM::InterfaceID SOCKET_ID_CONTROL = 0;
#include <openssl/x509v3.h>
#include <ckm/ckm-type.h>
-#include <client-certificate-impl.h>
+#include <certificate-impl.h>
#define OCSP_STATUS_GOOD 1