/*
- * Copyright 2001-2006 Internet2
+ * Copyright 2001-2007 Internet2
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
/**
* @file xmltooling/security/ChainingTrustEngine.h
*
- * X509TrustEngine that uses multiple engines in sequence.
+ * OpenSSLTrustEngine that uses multiple engines in sequence.
*/
#if !defined(__xmltooling_chaintrust_h__) && !defined(XMLTOOLING_NO_XMLSEC)
#define __xmltooling_chaintrust_h__
-#include <xmltooling/security/X509TrustEngine.h>
+#include <xmltooling/security/OpenSSLTrustEngine.h>
+#include <xmltooling/security/SignatureTrustEngine.h>
namespace xmltooling {
/**
- * X509TrustEngine that uses multiple engines in sequence.
+ * OpenSSLTrustEngine that uses multiple engines in sequence.
*/
- class XMLTOOL_API ChainingTrustEngine : public X509TrustEngine {
+ class XMLTOOL_API ChainingTrustEngine : public SignatureTrustEngine, public OpenSSLTrustEngine {
public:
/**
* Constructor.
*
* @param e DOM to supply configuration for provider
*/
- ChainingTrustEngine(const DOMElement* e=NULL);
+ ChainingTrustEngine(const xercesc::DOMElement* e=NULL);
/**
* Destructor will delete any embedded engines.
*
* @param newEngine trust engine to add
*/
- void addTrustEngine(X509TrustEngine* newEngine) {
+ void addTrustEngine(TrustEngine* newEngine) {
m_engines.push_back(newEngine);
}
* @param oldEngine trust engine to remove
* @return the old engine
*/
- X509TrustEngine* removeTrustEngine(X509TrustEngine* oldEngine) {
- for (std::vector<X509TrustEngine*>::iterator i=m_engines.begin(); i!=m_engines.end(); i++) {
+ TrustEngine* removeTrustEngine(TrustEngine* oldEngine) {
+ for (std::vector<TrustEngine*>::iterator i=m_engines.begin(); i!=m_engines.end(); i++) {
if (oldEngine==(*i)) {
m_engines.erase(i);
return oldEngine;
return NULL;
}
- virtual bool validate(
+ bool validate(
xmlsignature::Signature& sig,
- const KeyInfoSource& keyInfoSource,
- const xmlsignature::KeyResolver* keyResolver=NULL
+ const CredentialResolver& credResolver,
+ CredentialCriteria* criteria=NULL
) const;
- virtual bool validate(
+ bool validate(
const XMLCh* sigAlgorithm,
const char* sig,
xmlsignature::KeyInfo* keyInfo,
const char* in,
unsigned int in_len,
- const KeyInfoSource& keyInfoSource,
- const xmlsignature::KeyResolver* keyResolver=NULL
+ const CredentialResolver& credResolver,
+ CredentialCriteria* criteria=NULL
) const;
- virtual bool validate(
+ bool validate(
XSECCryptoX509* certEE,
const std::vector<XSECCryptoX509*>& certChain,
- const KeyInfoSource& keyInfoSource,
- bool checkName=true,
- const xmlsignature::KeyResolver* keyResolver=NULL
+ const CredentialResolver& credResolver,
+ CredentialCriteria* criteria=NULL
+ ) const;
+ bool validate(
+ X509* certEE,
+ STACK_OF(X509)* certChain,
+ const CredentialResolver& credResolver,
+ CredentialCriteria* criteria=NULL
) const;
-
private:
- std::vector<X509TrustEngine*> m_engines;
+ std::vector<TrustEngine*> m_engines;
+ std::vector<SignatureTrustEngine*> m_sigEngines;
+ std::vector<X509TrustEngine*> m_x509Engines;
+ std::vector<OpenSSLTrustEngine*> m_osslEngines;
};
};