-/*
- * Copyright 2001-2009 Internet2
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
+/**
+ * Licensed to the University Corporation for Advanced Internet
+ * Development, Inc. (UCAID) under one or more contributor license
+ * agreements. See the NOTICE file distributed with this work for
+ * additional information regarding copyright ownership.
*
- * http://www.apache.org/licenses/LICENSE-2.0
+ * UCAID licenses this file to you under the Apache License,
+ * Version 2.0 (the "License"); you may not use this file except
+ * in compliance with the License. You may obtain a copy of the
+ * License at
*
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
+ * either express or implied. See the License for the specific
+ * language governing permissions and limitations under the License.
*/
/**
#include <xmltooling/exceptions.h>
class XENCCipher;
+class XSECCryptoKey;
namespace xmltooling {
class XMLTOOL_API CredentialCriteria;
/**
* Constructor.
*
+ * <p>The final boolean parameter is used to enforce a requirement for an authenticated cipher
+ * suite such as AES-GCM or similar. These ciphers include an HMAC or equivalent step that
+ * prevents tampering. Newer applications should set this parameter to true unless the ciphertext
+ * has been independently authenticated, and even in such a case, it is rarely possible to prevent
+ * chosen ciphertext attacks by trusted signers.
+ *
* @param credResolver locked credential resolver to supply decryption keys
* @param criteria optional external criteria to use with resolver
* @param EKResolver locates an EncryptedKey pertaining to the EncryptedData
+ * @param requireAuthenticatedCipher true iff the bulk data encryption algorithm must be an authenticated cipher
*/
Decrypter(
- const xmltooling::CredentialResolver* credResolver=NULL,
- xmltooling::CredentialCriteria* criteria=NULL,
- const EncryptedKeyResolver* EKResolver=NULL
+ const xmltooling::CredentialResolver* credResolver=nullptr,
+ xmltooling::CredentialCriteria* criteria=nullptr,
+ const EncryptedKeyResolver* EKResolver=nullptr,
+ bool requireAuthenticatedCipher=false
);
virtual ~Decrypter();
/**
* Replace the current CredentialResolver interface, if any, with a new one.
*
- * @param resolver the locked CredentialResolver to attach, or NULL to clear
+ * @param resolver the locked CredentialResolver to attach, or nullptr to clear
* @param criteria optional external criteria to use with resolver
*/
void setKEKResolver(const xmltooling::CredentialResolver* resolver, xmltooling::CredentialCriteria* criteria);
* @param recipient identifier of decrypting entity for use in identifying multi-cast keys
* @return the decrypted DOM fragment
*/
- xercesc::DOMDocumentFragment* decryptData(const EncryptedData& encryptedData, const XMLCh* recipient=NULL);
+ xercesc::DOMDocumentFragment* decryptData(const EncryptedData& encryptedData, const XMLCh* recipient=nullptr);
/**
* Decrypts the supplied information to an output stream.
* @param encryptedData the data to decrypt
* @param recipient identifier of decrypting entity for use in identifying multi-cast keys
*/
- void decryptData(std::ostream& out, const EncryptedData& encryptedData, const XMLCh* recipient=NULL);
+ void decryptData(std::ostream& out, const EncryptedData& encryptedData, const XMLCh* recipient=nullptr);
/**
* Decrypts the supplied information and returns the resulting key.
const xmltooling::CredentialResolver* m_credResolver;
xmltooling::CredentialCriteria* m_criteria;
const EncryptedKeyResolver* m_EKResolver;
+ bool m_requireAuthenticatedCipher;
};
DECL_XMLTOOLING_EXCEPTION(DecryptionException,XMLTOOL_EXCEPTIONAPI(XMLTOOL_API),xmlencryption,xmltooling::XMLToolingException,Exceptions in decryption processing);