#ifdef _DEBUG
NDC ndc("loadKeyFromFile");
#endif
- Category& log = Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper");
+ Category& log = Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper");
log.info("loading private key from file (%s)", pathname);
// Native objects.
#ifdef _DEBUG
NDC ndc("loadCertificatesFromFile");
#endif
- Category& log = Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper");
+ Category& log = Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper");
log.info("loading certificate(s) from file (%s)", pathname);
vector<XSECCryptoX509*>::size_type count = certs.size();
#ifdef _DEBUG
NDC ndc("loadCRLsFromFile");
#endif
- Category& log = Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper");
+ Category& log = Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper");
log.info("loading CRL(s) from file (%s)", pathname);
vector<XSECCryptoX509CRL*>::size_type count = crls.size();
{
if (key1.getProviderName()!=DSIGConstants::s_unicodeStrPROVOpenSSL ||
key2.getProviderName()!=DSIGConstants::s_unicodeStrPROVOpenSSL) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").warn("comparison of non-OpenSSL keys not supported");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").warn("comparison of non-OpenSSL keys not supported");
return false;
}
}
#endif
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").warn("unsupported key type for comparison");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").warn("unsupported key type for comparison");
return false;
}
const EVP_MD* md = EVP_get_digestbyname(hashAlg);
if (!md) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").error("hash algorithm (%s) not available", hashAlg);
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").error("hash algorithm (%s) not available", hashAlg);
return ret;
}
int len = BIO_gets(chain, digest, EVP_MD_size(md));
BIO_free_all(chain);
if (len != EVP_MD_size(md)) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").error(
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").error(
"hash result length (%d) did not match expected value (%d)", len, EVP_MD_size(md)
);
return ret;
string ret;
if (key.getProviderName()!=DSIGConstants::s_unicodeStrPROVOpenSSL) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").warn("encoding of non-OpenSSL keys not supported");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").warn("encoding of non-OpenSSL keys not supported");
return ret;
}
if (key.getKeyType() == XSECCryptoKey::KEY_RSA_PUBLIC || key.getKeyType() == XSECCryptoKey::KEY_RSA_PAIR) {
rsa = static_cast<const OpenSSLCryptoKeyRSA&>(key).getOpenSSLRSA();
if (!rsa) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").warn("key was not populated");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").warn("key was not populated");
return ret;
}
}
else if (key.getKeyType() == XSECCryptoKey::KEY_DSA_PUBLIC || key.getKeyType() == XSECCryptoKey::KEY_DSA_PAIR) {
dsa = static_cast<const OpenSSLCryptoKeyDSA&>(key).getOpenSSLDSA();
if (!dsa) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").warn("key was not populated");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").warn("key was not populated");
return ret;
}
}
else if (key.getKeyType() == XSECCryptoKey::KEY_EC_PUBLIC || key.getKeyType() == XSECCryptoKey::KEY_EC_PAIR) {
ec = static_cast<const OpenSSLCryptoKeyEC&>(key).getOpenSSLEC();
if (!ec) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").warn("key was not populated");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").warn("key was not populated");
return ret;
}
}
#endif
else {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").warn("public key type not supported");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").warn("public key type not supported");
return ret;
}
if (hash) {
md = EVP_get_digestbyname(hash);
if (!md) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").error("hash algorithm (%s) not available", hash);
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").error("hash algorithm (%s) not available", hash);
return ret;
}
}
string ret;
if (cert.getProviderName()!=DSIGConstants::s_unicodeStrPROVOpenSSL) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").warn("encoding of non-OpenSSL keys not supported");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").warn("encoding of non-OpenSSL keys not supported");
return ret;
}
if (hash) {
md = EVP_get_digestbyname(hash);
if (!md) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").error("hash algorithm (%s) not available", hash);
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").error("hash algorithm (%s) not available", hash);
return ret;
}
}
if (base64) {
decoded = xercesc::Base64::decode(reinterpret_cast<const XMLByte*>(buf), &x);
if (!decoded) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").error("base64 decode failed");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").error("base64 decode failed");
return nullptr;
}
}
break;
#endif
default:
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").error("unsupported public key type");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").error("unsupported public key type");
}
}
catch (XSECCryptoException& ex) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").error(ex.getMsg());
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").error(ex.getMsg());
}
EVP_PKEY_free(pkey);
return ret;
xsecsize_t x;
XMLByte* decoded = xercesc::Base64::decodeToXMLByte(buf, &x);
if (!decoded) {
- Category::getInstance(XMLTOOLING_LOGCAT".SecurityHelper").error("base64 decode failed");
+ Category::getInstance(XMLTOOLING_LOGCAT ".SecurityHelper").error("base64 decode failed");
return nullptr;
}
XSECCryptoKey* ret = fromDEREncoding((const char*)decoded, x, false);