blob: fc5d39089d04e528eec1d51f7c2977219adfa0eb [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
/*
* XSEC
*
* NSSCryptoKeyHMAC := HMAC Keys
*
* Author(s): Milan Tomic
*
*/
#ifndef NSSCRYPTOKEYHMAC_INCLUDE
#define NSSCRYPTOKEYHMAC_INCLUDE
#include <xsec/enc/XSECCryptoKeyHMAC.hpp>
#if defined (XSEC_HAVE_NSS)
#include <pk11func.h>
#include <nss.h>
/**
* \ingroup nsscrypto
* @{
*/
/**
* \brief NSS implementation for HMAC keys.
*
*/
class XSEC_EXPORT NSSCryptoKeyHMAC : public XSECCryptoKeyHMAC {
public :
/** @name Constructors and Destructors */
//@{
/**
* \brief Constructor
*
*/
NSSCryptoKeyHMAC();
virtual ~NSSCryptoKeyHMAC() {};
//@}
/** @name Key Interface methods */
//@{
/**
* \brief Return the type of this key.
*
* For DSA keys, this allows people to determine whether this is a
* public key, private key or a key pair
*/
virtual XSECCryptoKey::KeyType getKeyType() const {return KEY_HMAC;}
/**
* \brief Replicate key
*/
virtual XSECCryptoKey * clone() const;
/**
* \brief Return the NSS string identifier
*/
virtual const XMLCh * getProviderName() const;
//@}
/** @name Optional Interface methods */
//@{
/**
* \brief Set the key
*
* Set the key from the buffer
*
* @param inBuf Buffer containing the direct bitwise representation of the key
* @param inLength Number of bytes of key in the buffer
*
* @note isSensitive() should have been called on the inbound buffer
* to ensure the contents is overwritten when the safeBuffer is deleted
*/
virtual void setKey(unsigned char * inBuf, unsigned int inLength);
/**
* \brief Get the key value
*
* Copy the key into the safeBuffer and return the number of bytes
* copied.
*
* @param outBuf Buffer to copy key into
* @returns number of bytes copied in
*/
virtual unsigned int getKey(safeBuffer &outBuf) const;
//@}
private:
safeBuffer m_keyBuf;
unsigned int m_keyLen;
};
#endif /* XSEC_HAVE_NSS */
#endif /* NSSCRYPTOKEYHMAC_INCLUDE */