2 * Copyright 2001-2010 Internet2
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
18 * XMLToolingConfig.cpp
20 * Library configuration.
24 #include "exceptions.h"
26 #include "XMLToolingConfig.h"
27 #include "encryption/Encryption.h"
28 #include "encryption/Encrypter.h"
29 #include "impl/UnknownElement.h"
30 #include "io/HTTPResponse.h"
31 #include "security/TrustEngine.h"
32 #include "security/OpenSSLCryptoX509CRL.h"
33 #include "security/CredentialResolver.h"
34 #include "security/KeyInfoResolver.h"
35 #include "signature/KeyInfo.h"
36 #include "signature/Signature.h"
37 #include "soap/SOAP.h"
39 #include "util/PathResolver.h"
40 #include "util/ReplayCache.h"
41 #include "util/StorageService.h"
42 #include "util/TemplateEngine.h"
43 #include "util/Threads.h"
44 #include "util/URLEncoder.h"
45 #include "validation/ValidatorSuite.h"
52 #if defined(XMLTOOLING_LOG4SHIB)
53 # include <log4shib/PropertyConfigurator.hh>
54 # include <log4shib/OstreamAppender.hh>
55 #elif defined(XMLTOOLING_LOG4CPP)
56 # include <log4cpp/PropertyConfigurator.hh>
57 # include <log4cpp/OstreamAppender.hh>
59 #include <xercesc/util/PlatformUtils.hpp>
60 #include <xercesc/util/XMLUniDefs.hpp>
61 #ifndef XMLTOOLING_NO_XMLSEC
62 # include <curl/curl.h>
63 # include <openssl/err.h>
64 # include <openssl/evp.h>
65 # include <xsec/framework/XSECAlgorithmMapper.hpp>
66 # include <xsec/framework/XSECException.hpp>
67 # include <xsec/framework/XSECProvider.hpp>
68 # include <xsec/transformers/TXFMBase.hpp>
71 using namespace soap11;
72 using namespace xmltooling::logging;
73 using namespace xmltooling;
74 using namespace xercesc;
78 # if (OPENSSL_VERSION_NUMBER >= 0x00908000)
79 # define XMLTOOLING_OPENSSL_HAVE_SHA2 1
84 DECL_XMLTOOLING_EXCEPTION_FACTORY(XMLParserException,xmltooling);
85 DECL_XMLTOOLING_EXCEPTION_FACTORY(XMLObjectException,xmltooling);
86 DECL_XMLTOOLING_EXCEPTION_FACTORY(MarshallingException,xmltooling);
87 DECL_XMLTOOLING_EXCEPTION_FACTORY(UnmarshallingException,xmltooling);
88 DECL_XMLTOOLING_EXCEPTION_FACTORY(UnknownElementException,xmltooling);
89 DECL_XMLTOOLING_EXCEPTION_FACTORY(UnknownAttributeException,xmltooling);
90 DECL_XMLTOOLING_EXCEPTION_FACTORY(UnknownExtensionException,xmltooling);
91 DECL_XMLTOOLING_EXCEPTION_FACTORY(ValidationException,xmltooling);
92 DECL_XMLTOOLING_EXCEPTION_FACTORY(IOException,xmltooling);
94 #ifndef XMLTOOLING_NO_XMLSEC
95 using namespace xmlencryption;
96 using namespace xmlsignature;
97 DECL_XMLTOOLING_EXCEPTION_FACTORY(XMLSecurityException,xmltooling);
98 DECL_XMLTOOLING_EXCEPTION_FACTORY(SignatureException,xmlsignature);
99 DECL_XMLTOOLING_EXCEPTION_FACTORY(EncryptionException,xmlencryption);
103 static XMLToolingInternalConfig g_config;
104 #ifndef XMLTOOLING_NO_XMLSEC
105 static vector<Mutex*> g_openssl_locks;
107 extern "C" void openssl_locking_callback(int mode,int n,const char *file,int line)
109 if (mode & CRYPTO_LOCK)
110 g_openssl_locks[n]->lock();
112 g_openssl_locks[n]->unlock();
116 extern "C" unsigned long openssl_thread_id(void)
118 return (unsigned long)(pthread_self());
122 # ifdef XMLTOOLING_XMLSEC_DEBUGLOGGING
123 class TXFMOutputLog : public TXFMBase {
126 TXFMOutputLog(DOMDocument* doc) : TXFMBase(doc), m_log(Category::getInstance(XMLTOOLING_LOGCAT".Signature.Debugger")) {
130 m_log.debug("\n----- END SIGNATURE DEBUG -----\n");
133 void setInput(TXFMBase *newInput) {
135 if (newInput->getOutputType() != TXFMBase::BYTE_STREAM)
136 throw XSECException(XSECException::TransformInputOutputFail, "OutputLog transform requires BYTE_STREAM input");
137 keepComments = input->getCommentsStatus();
138 m_log.debug("\n----- BEGIN SIGNATURE DEBUG -----\n");
141 TXFMBase::ioType getInputType() {
142 return TXFMBase::BYTE_STREAM;
144 TXFMBase::ioType getOutputType() {
145 return TXFMBase::BYTE_STREAM;
147 TXFMBase::nodeType getNodeType() {
148 return TXFMBase::DOM_NODE_NONE;
151 unsigned int readBytes(XMLByte * const toFill, const unsigned int maxToFill) {
152 unsigned int sz = input->readBytes(toFill, maxToFill);
153 m_log.debug(string(reinterpret_cast<char* const>(toFill), sz));
157 DOMDocument* getDocument() {
160 DOMNode* getFragmentNode() {
163 const XMLCh* getFragmentId() {
171 TXFMBase* TXFMOutputLogFactory(DOMDocument* doc) {
172 if (Category::getInstance(XMLTOOLING_LOGCAT".Signature.Debugger").isDebugEnabled())
173 return new TXFMOutputLog(doc);
182 LPCSTR lpUNCServerName,
188 LPCSTR messages[] = {message, nullptr};
190 HANDLE hElog = RegisterEventSource(lpUNCServerName, "OpenSAML XMLTooling Library");
191 BOOL res = ReportEvent(hElog, wType, 0, dwEventID, lpUserSid, 1, 0, messages, nullptr);
192 return (DeregisterEventSource(hElog) && res);
197 XMLToolingConfig& XMLToolingConfig::getConfig()
202 XMLToolingInternalConfig& XMLToolingInternalConfig::getInternalConfig()
207 #ifndef XMLTOOLING_NO_XMLSEC
208 XMLToolingConfig::XMLToolingConfig()
209 : m_keyInfoResolver(nullptr), m_replayCache(nullptr), m_pathResolver(nullptr), m_templateEngine(nullptr), m_urlEncoder(nullptr), clock_skew_secs(180)
211 XMLToolingConfig::XMLToolingConfig()
212 : m_pathResolver(nullptr), m_templateEngine(nullptr), m_urlEncoder(nullptr), clock_skew_secs(180)
217 XMLToolingConfig::~XMLToolingConfig()
221 bool XMLToolingInternalConfig::log_config(const char* config)
224 if (!config || !*config)
225 config=getenv("XMLTOOLING_LOG_CONFIG");
226 if (!config || !*config)
230 Category& root = Category::getRoot();
231 if (!strcmp(config,"DEBUG")) {
232 root.setPriority(Priority::DEBUG);
235 else if (!strcmp(config,"INFO")) {
236 root.setPriority(Priority::INFO);
239 else if (!strcmp(config,"NOTICE")) {
240 root.setPriority(Priority::NOTICE);
243 else if (!strcmp(config,"WARN")) {
244 root.setPriority(Priority::WARN);
247 else if (!strcmp(config,"ERROR")) {
248 root.setPriority(Priority::ERROR);
251 else if (!strcmp(config,"CRIT")) {
252 root.setPriority(Priority::CRIT);
255 else if (!strcmp(config,"ALERT")) {
256 root.setPriority(Priority::ALERT);
259 else if (!strcmp(config,"EMERG")) {
260 root.setPriority(Priority::EMERG);
263 else if (!strcmp(config,"FATAL")) {
264 root.setPriority(Priority::FATAL);
268 root.setAppender(new OstreamAppender("default",&cerr));
272 PropertyConfigurator::configure(m_pathResolver ? m_pathResolver->resolve(path, PathResolver::XMLTOOLING_CFG_FILE) : path);
275 #ifndef XMLTOOLING_NO_XMLSEC
276 Category::getInstance(XMLTOOLING_LOGCAT".Signature.Debugger").setAdditivity(false);
279 catch (const ConfigureFailure& e) {
280 string msg = string("failed to configure logging: ") + e.what();
281 Category::getInstance(XMLTOOLING_LOGCAT".Logging").crit(msg);
283 LogEvent(nullptr, EVENTLOG_ERROR_TYPE, 2100, nullptr, msg.c_str());
291 #ifndef XMLTOOLING_LITE
292 const KeyInfoResolver* XMLToolingConfig::getKeyInfoResolver() const
294 return m_keyInfoResolver;
297 ReplayCache* XMLToolingConfig::getReplayCache() const
299 return m_replayCache;
302 void XMLToolingConfig::setKeyInfoResolver(xmltooling::KeyInfoResolver *keyInfoResolver)
304 delete m_keyInfoResolver;
305 m_keyInfoResolver = keyInfoResolver;
308 void XMLToolingConfig::setReplayCache(ReplayCache* replayCache)
310 delete m_replayCache;
311 m_replayCache = replayCache;
315 PathResolver* XMLToolingConfig::getPathResolver() const
317 return m_pathResolver;
320 TemplateEngine* XMLToolingConfig::getTemplateEngine() const
322 return m_templateEngine;
325 const URLEncoder* XMLToolingConfig::getURLEncoder() const
330 void XMLToolingConfig::setPathResolver(PathResolver* pathResolver)
332 delete m_pathResolver;
333 m_pathResolver = pathResolver;
336 void XMLToolingConfig::setTemplateEngine(TemplateEngine* templateEngine)
338 delete m_templateEngine;
339 m_templateEngine = templateEngine;
342 void XMLToolingConfig::setURLEncoder(URLEncoder* urlEncoder)
345 m_urlEncoder = urlEncoder;
348 bool XMLToolingInternalConfig::init()
351 xmltooling::NDC ndc("init");
353 Category& log=Category::getInstance(XMLTOOLING_LOGCAT".XMLToolingConfig");
355 log.debug("library initialization started");
357 #ifndef XMLTOOLING_NO_XMLSEC
358 if (curl_global_init(CURL_GLOBAL_ALL)) {
359 log.fatal("failed to initialize libcurl, OpenSSL, or Winsock");
362 curl_version_info_data* curlver = curl_version_info(CURLVERSION_NOW);
364 log.debug("libcurl %s initialization complete", curlver->version);
365 if (!(curlver->features & CURL_VERSION_SSL)) {
366 log.warn("libcurl lacks TLS/SSL support, this will greatly limit functionality");
370 log.debug("libcurl %s initialization complete", LIBCURL_VERSION);
374 XMLPlatformUtils::Initialize();
375 log.debug("Xerces %s initialization complete", XERCES_FULLVERSIONDOT);
377 #ifndef XMLTOOLING_NO_XMLSEC
378 XSECPlatformUtils::Initialise();
379 # ifdef XMLTOOLING_XMLSEC_DEBUGLOGGING
380 XSECPlatformUtils::SetReferenceLoggingSink(TXFMOutputLogFactory);
382 m_xsecProvider=new XSECProvider();
383 log.debug("XML-Security %s initialization complete", XSEC_FULLVERSIONDOT);
386 m_parserPool=new ParserPool();
387 m_validatingPool=new ParserPool(true,true);
388 m_lock=XMLPlatformUtils::makeMutex();
390 // Load catalogs from path.
391 if (!catalog_path.empty()) {
392 char* catpath=strdup(catalog_path.c_str());
395 while (start && *start) {
396 sep=strchr(start,PATH_SEPARATOR_CHAR);
399 auto_ptr_XMLCh temp(start);
400 m_validatingPool->loadCatalog(temp.get());
401 start = sep ? sep + 1 : nullptr;
406 // default registrations
407 XMLObjectBuilder::registerDefaultBuilder(new UnknownElementBuilder());
409 registerSOAPClasses();
411 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(XMLParserException,xmltooling);
412 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(XMLObjectException,xmltooling);
413 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(MarshallingException,xmltooling);
414 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(UnmarshallingException,xmltooling);
415 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(UnknownElementException,xmltooling);
416 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(UnknownAttributeException,xmltooling);
417 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(ValidationException,xmltooling);
418 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(IOException,xmltooling);
420 #ifndef XMLTOOLING_NO_XMLSEC
421 XMLObjectBuilder::registerBuilder(QName(xmlconstants::XMLSIG_NS,Signature::LOCAL_NAME),new SignatureBuilder());
422 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(XMLSecurityException,xmltooling);
423 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(SignatureException,xmlsignature);
424 REGISTER_XMLTOOLING_EXCEPTION_FACTORY(EncryptionException,xmlencryption);
425 registerKeyInfoClasses();
426 registerEncryptionClasses();
427 registerKeyInfoResolvers();
428 registerCredentialResolvers();
429 registerTrustEngines();
430 registerXMLAlgorithms();
431 registerSOAPTransports();
432 initSOAPTransports();
433 registerStorageServices();
434 m_keyInfoResolver = KeyInfoResolverManager.newPlugin(INLINE_KEYINFO_RESOLVER,nullptr);
437 m_pathResolver = new PathResolver();
438 m_urlEncoder = new URLEncoder();
440 HTTPResponse::getAllowedSchemes().push_back("https");
441 HTTPResponse::getAllowedSchemes().push_back("http");
443 // Register xml:id as an ID attribute.
444 static const XMLCh xmlid[] = UNICODE_LITERAL_2(i,d);
445 AttributeExtensibleXMLObject::registerIDAttribute(QName(xmlconstants::XML_NS, xmlid));
447 catch (const xercesc::XMLException&) {
448 log.fatal("caught exception while initializing Xerces");
449 #ifndef XMLTOOLING_NO_XMLSEC
450 curl_global_cleanup();
455 #ifndef XMLTOOLING_NO_XMLSEC
456 // Set up OpenSSL locking.
457 for (int i=0; i<CRYPTO_num_locks(); i++)
458 g_openssl_locks.push_back(Mutex::create());
459 CRYPTO_set_locking_callback(openssl_locking_callback);
461 CRYPTO_set_id_callback(openssl_thread_id);
465 log.info("%s library initialization complete", PACKAGE_STRING);
469 void XMLToolingInternalConfig::term()
471 #ifndef XMLTOOLING_NO_XMLSEC
472 CRYPTO_set_locking_callback(nullptr);
473 for_each(g_openssl_locks.begin(), g_openssl_locks.end(), xmltooling::cleanup<Mutex>());
474 g_openssl_locks.clear();
477 SchemaValidators.destroyValidators();
478 XMLObjectBuilder::destroyBuilders();
479 XMLToolingException::deregisterFactories();
480 AttributeExtensibleXMLObject::deregisterIDAttributes();
482 #ifndef XMLTOOLING_NO_XMLSEC
483 StorageServiceManager.deregisterFactories();
484 termSOAPTransports();
485 SOAPTransportManager.deregisterFactories();
486 TrustEngineManager.deregisterFactories();
487 CredentialResolverManager.deregisterFactories();
488 KeyInfoResolverManager.deregisterFactories();
489 m_algorithmMap.clear();
491 delete m_keyInfoResolver;
492 m_keyInfoResolver = nullptr;
494 delete m_replayCache;
495 m_replayCache = nullptr;
498 delete m_pathResolver;
499 m_pathResolver = nullptr;
501 delete m_templateEngine;
502 m_templateEngine = nullptr;
505 m_urlEncoder = nullptr;
507 for (vector<void*>::reverse_iterator i=m_libhandles.rbegin(); i!=m_libhandles.rend(); i++) {
509 FARPROC fn=GetProcAddress(static_cast<HMODULE>(*i),"xmltooling_extension_term");
512 FreeLibrary(static_cast<HMODULE>(*i));
513 #elif defined(HAVE_DLFCN_H)
514 void (*fn)()=(void (*)())dlsym(*i,"xmltooling_extension_term");
519 # error "Don't know about dynamic loading on this platform!"
522 m_libhandles.clear();
525 m_parserPool=nullptr;
526 delete m_validatingPool;
527 m_validatingPool=nullptr;
529 #ifndef XMLTOOLING_NO_XMLSEC
530 delete m_xsecProvider;
531 m_xsecProvider=nullptr;
532 XSECPlatformUtils::Terminate();
535 XMLPlatformUtils::closeMutex(m_lock);
537 XMLPlatformUtils::Terminate();
539 #ifndef XMLTOOLING_NO_XMLSEC
540 curl_global_cleanup();
543 xmltooling::NDC ndc("term");
545 Category::getInstance(XMLTOOLING_LOGCAT".XMLToolingConfig").info("%s library shutdown complete", PACKAGE_STRING);
548 Lockable* XMLToolingInternalConfig::lock()
550 xercesc::XMLPlatformUtils::lockMutex(m_lock);
554 void XMLToolingInternalConfig::unlock()
556 xercesc::XMLPlatformUtils::unlockMutex(m_lock);
559 bool XMLToolingInternalConfig::load_library(const char* path, void* context)
562 xmltooling::NDC ndc("LoadLibrary");
564 Category& log=Category::getInstance(XMLTOOLING_LOGCAT".XMLToolingConfig");
565 log.info("loading extension: %s", path);
569 string resolved(path);
570 m_pathResolver->resolve(resolved, PathResolver::XMLTOOLING_LIB_FILE);
573 HMODULE handle=nullptr;
574 for (string::iterator i = resolved.begin(); i != resolved.end(); ++i)
578 UINT em=SetErrorMode(SEM_FAILCRITICALERRORS);
580 handle=LoadLibraryEx(resolved.c_str(),nullptr,LOAD_WITH_ALTERED_SEARCH_PATH);
582 handle=LoadLibraryEx(resolved.c_str(),nullptr,0);
584 throw runtime_error(string("unable to load extension library: ") + resolved);
585 FARPROC fn=GetProcAddress(handle,"xmltooling_extension_init");
587 throw runtime_error(string("unable to locate xmltooling_extension_init entry point: ") + resolved);
588 if (reinterpret_cast<int(*)(void*)>(fn)(context)!=0)
589 throw runtime_error(string("detected error in xmltooling_extension_init: ") + resolved);
599 #elif defined(HAVE_DLFCN_H)
600 void* handle=dlopen(resolved.c_str(),RTLD_LAZY);
602 throw runtime_error(string("unable to load extension library '") + resolved + "': " + dlerror());
603 int (*fn)(void*)=(int (*)(void*))(dlsym(handle,"xmltooling_extension_init"));
607 string("unable to locate xmltooling_extension_init entry point in '") + resolved + "': " +
608 (dlerror() ? dlerror() : "unknown error")
613 throw runtime_error(string("detected error in xmltooling_extension_init in ") + resolved);
621 # error "Don't know about dynamic loading on this platform!"
623 m_libhandles.push_back(handle);
624 log.info("loaded extension: %s", resolved.c_str());
628 #ifndef XMLTOOLING_NO_XMLSEC
630 void xmltooling::log_openssl()
636 unsigned long code=ERR_get_error_line_data(&file,&line,&data,&flags);
638 Category& log=Category::getInstance("OpenSSL");
639 log.errorStream() << "error code: " << code << " in " << file << ", line " << line << logging::eol;
640 if (data && (flags & ERR_TXT_STRING))
641 log.errorStream() << "error data: " << data << logging::eol;
642 code=ERR_get_error_line_data(&file,&line,&data,&flags);
646 XSECCryptoX509CRL* XMLToolingInternalConfig::X509CRL() const
648 return new OpenSSLCryptoX509CRL();
651 pair<const char*,unsigned int> XMLToolingInternalConfig::mapXMLAlgorithmToKeyAlgorithm(const XMLCh* xmlAlgorithm) const
653 for (algmap_t::const_iterator i = m_algorithmMap.begin(); i != m_algorithmMap.end(); ++i) {
654 algmap_t::value_type::second_type::const_iterator j = i->second.find(xmlAlgorithm);
655 if (j != i->second.end())
656 return pair<const char*,unsigned int>(j->second.first.c_str(), j->second.second);
658 return pair<const char*,unsigned int>(nullptr, 0);
661 void XMLToolingInternalConfig::registerXMLAlgorithm(
662 const XMLCh* xmlAlgorithm, const char* keyAlgorithm, unsigned int size, XMLSecurityAlgorithmType type
665 m_algorithmMap[type][xmlAlgorithm] = pair<string,unsigned int>((keyAlgorithm ? keyAlgorithm : ""), size);
668 bool XMLToolingInternalConfig::isXMLAlgorithmSupported(const XMLCh* xmlAlgorithm, XMLSecurityAlgorithmType type)
671 // First check for basic support from the xmlsec layer.
672 if (XSECPlatformUtils::g_algorithmMapper->mapURIToHandler(xmlAlgorithm)) {
673 // Make sure the algorithm is registered.
674 algmap_t::const_iterator i = m_algorithmMap.find(type);
675 if (i != m_algorithmMap.end()) {
676 algmap_t::value_type::second_type::const_iterator j = i->second.find(xmlAlgorithm);
677 if (j != i->second.end())
682 catch (XSECException&) {
687 void XMLToolingInternalConfig::registerXMLAlgorithms()
689 // The deal with all the macros is to try and figure out with no false positives whether
690 // the OpenSSL version *and* the XML-Security version support the algorithms.
692 // With ECDSA, XML-Security exports a public macro for OpenSSL's support, and any
693 // versions of XML-Security that didn't provide the macro don't handle ECDSA anyway.
695 // With AES, all supported XML-Security versions export a macro for OpenSSL's support.
697 // With SHA2, only the very latest XML-Security exports a macro, but all the versions
698 // will handle SHA2 *if* OpenSSL does. So we use our own macro to check OpenSSL's
699 // support, and then add checks to see if specific versions are compiled out.
701 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIMD5, nullptr, 0, ALGTYPE_DIGEST);
702 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURISHA1, nullptr, 0, ALGTYPE_DIGEST);
703 #if defined(XMLTOOLING_OPENSSL_HAVE_SHA2) && !defined(OPENSSL_NO_SHA256)
704 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURISHA224, nullptr, 0, ALGTYPE_DIGEST);
705 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURISHA256, nullptr, 0, ALGTYPE_DIGEST);
707 #if defined(XMLTOOLING_OPENSSL_HAVE_SHA2) && !defined(OPENSSL_NO_SHA512)
708 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURISHA384, nullptr, 0, ALGTYPE_DIGEST);
709 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURISHA512, nullptr, 0, ALGTYPE_DIGEST);
712 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIDSA_SHA1, "DSA", 0, ALGTYPE_SIGN);
713 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIRSA_MD5, "RSA", 0, ALGTYPE_SIGN);
714 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIRSA_SHA1, "RSA", 0, ALGTYPE_SIGN);
715 #if defined(XMLTOOLING_OPENSSL_HAVE_SHA2) && !defined(OPENSSL_NO_SHA256)
716 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIRSA_SHA224, "RSA", 0, ALGTYPE_SIGN);
717 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIRSA_SHA256, "RSA", 0, ALGTYPE_SIGN);
719 #if defined(XMLTOOLING_OPENSSL_HAVE_SHA2) && !defined(OPENSSL_NO_SHA512)
720 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIRSA_SHA384, "RSA", 0, ALGTYPE_SIGN);
721 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIRSA_SHA512, "RSA", 0, ALGTYPE_SIGN);
724 #ifdef XSEC_OPENSSL_HAVE_EC
725 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIECDSA_SHA1, "EC", 0, ALGTYPE_SIGN);
726 #if defined(XMLTOOLING_OPENSSL_HAVE_SHA2) && !defined(OPENSSL_NO_SHA256)
727 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIECDSA_SHA256, "EC", 0, ALGTYPE_SIGN);
729 #if defined(XMLTOOLING_OPENSSL_HAVE_SHA2) && !defined(OPENSSL_NO_SHA512)
730 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIECDSA_SHA384, "EC", 0, ALGTYPE_SIGN);
731 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIECDSA_SHA512, "EC", 0, ALGTYPE_SIGN);
735 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIHMAC_SHA1, "HMAC", 0, ALGTYPE_SIGN);
736 #if defined(XMLTOOLING_OPENSSL_HAVE_SHA2) && !defined(OPENSSL_NO_SHA256)
737 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIHMAC_SHA224, "HMAC", 0, ALGTYPE_SIGN);
738 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIHMAC_SHA256, "HMAC", 0, ALGTYPE_SIGN);
740 #if defined(XMLTOOLING_OPENSSL_HAVE_SHA2) && !defined(OPENSSL_NO_SHA512)
741 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIHMAC_SHA384, "HMAC", 0, ALGTYPE_SIGN);
742 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIHMAC_SHA512, "HMAC", 0, ALGTYPE_SIGN);
745 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIRSA_1_5, "RSA", 0, ALGTYPE_KEYENCRYPT);
746 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIRSA_OAEP_MGFP1, "RSA", 0, ALGTYPE_KEYENCRYPT);
748 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURI3DES_CBC, "DESede", 192, ALGTYPE_ENCRYPT);
749 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIKW_3DES, "DESede", 192, ALGTYPE_KEYENCRYPT);
751 #ifdef XSEC_OPENSSL_HAVE_AES
752 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIAES128_CBC, "AES", 128, ALGTYPE_ENCRYPT);
753 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIKW_AES128, "AES", 128, ALGTYPE_KEYENCRYPT);
755 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIAES192_CBC, "AES", 192, ALGTYPE_ENCRYPT);
756 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIKW_AES192, "AES", 192, ALGTYPE_KEYENCRYPT);
758 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIAES256_CBC, "AES", 256, ALGTYPE_ENCRYPT);
759 registerXMLAlgorithm(DSIGConstants::s_unicodeStrURIKW_AES256, "AES", 256, ALGTYPE_KEYENCRYPT);
767 extern "C" __declspec(dllexport) BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID)
769 if (fdwReason == DLL_THREAD_DETACH || fdwReason == DLL_PROCESS_DETACH)
770 ThreadKey::onDetach();