/usr/include/xsec/enc/XSECCryptoKeyEC.hpp is in libxml-security-c-dev 1.7.2-3+b1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 | /**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
/*
* XSEC
*
* XSECCryptoKeyEC := EC Keys
*
* Author(s): Scott Cantor
*
* $Id:$
*
*/
#ifndef XSECCRYPTOKEYEC_INCLUDE
#define XSECCRYPTOKEYEC_INCLUDE
#include <xsec/enc/XSECCryptoKey.hpp>
/**
* \ingroup crypto
*/
/**
* \brief Interface class for RSA keys.
*
* The library uses classes derived from this to process RSA keys.
*/
class DSIG_EXPORT XSECCryptoKeyEC : public XSECCryptoKey {
public :
/** @name Constructors and Destructors */
//@{
XSECCryptoKeyEC() {};
virtual ~XSECCryptoKeyEC() {};
//@}
/** @name Key Interface methods */
//@{
/**
* \brief Return the type of this key.
*
* For EC keys, this allows people to determine whether this is a
* public key, private key or a key pair
*/
virtual XSECCryptoKey::KeyType getKeyType() const {return KEY_NONE;}
/**
* \brief Replicate key
*/
virtual XSECCryptoKey * clone() const = 0;
//@}
/** @name Mandatory EC interface methods
*
* These methods are required by the library.
*/
//@{
/**
* \brief Verify an EC-DSA signature
*
* The library will call this function to validate a signature
*
* @param hashBuf Buffer containing the pre-calculated (binary) digest
* @param hashLen Length of the data in the digest buffer
* @param base64Signature Buffer containing the Base64 encoded signature
* @param sigLen Length of the data in the signature buffer
* @returns true if the signature was valid, false otherwise
*/
virtual bool verifyBase64SignatureDSA(unsigned char * hashBuf,
unsigned int hashLen,
char * base64Signature,
unsigned int sigLen) = 0;
/**
* \brief Create an EC-DSA signature
*
* The library will call this function to create a signature from
* a pre-calculated digest. The output signature is required to
* be Base64 encoded such that it can be placed directly into the
* XML document
*
* @param hashBuf Buffer containing the pre-calculated (binary) digest
* @param hashLen Number of bytes of hash in the hashBuf
* @param base64SignatureBuf Buffer to place the base64 encoded result
* in.
* @param base64SignatureBufLen Implementations need to ensure they do
* not write more bytes than this into the buffer
*/
virtual unsigned int signBase64SignatureDSA(unsigned char * hashBuf,
unsigned int hashLen,
char * base64SignatureBuf,
unsigned int base64SignatureBufLen) = 0;
//@}
/** @name Optional Interface methods
*
* These functions do not necessarily have to be implmented. They
* are used by XSECKeyInfoResolverDefault to try to create a key from
* KeyInfo elements without knowing anything else.
*
* If an interface class does not implement these functions, a simple
* stub that does nothing should be used.
*/
//@{
/**
* \brief Load the key
*
* Load the key for a named curve from a Base64 encoded string
*
* param curveName a URI identifying the curve (typically an OID URN)
* param b64 A buffer containing the encoded string
* param len The length of the data in the buffer
*/
virtual void loadPublicKeyBase64(const char* curveName,
const char* b64,
unsigned int len) = 0;
//@}
};
#endif /* XSECCRYPTOKEYEC_INCLUDE */
|