diff options
author | Krzysztof Jackiewicz <k.jackiewicz@samsung.com> | 2014-09-22 10:09:03 +0200 |
---|---|---|
committer | Bartlomiej Grzelewski <b.grzelewski@samsung.com> | 2014-10-16 17:10:48 +0200 |
commit | 4115a735bf63b2afcf7051d4261b0436b4c85621 (patch) | |
tree | 0d345045e5219e62b4d1f381545f4c939a3bf9c0 | |
parent | 69a47332bd800b434abf29685d72eb8c051d9a08 (diff) | |
download | key-manager-4115a735bf63b2afcf7051d4261b0436b4c85621.tar.gz key-manager-4115a735bf63b2afcf7051d4261b0436b4c85621.tar.bz2 key-manager-4115a735bf63b2afcf7051d4261b0436b4c85621.zip |
Async API stubs
Change-Id: I3d91fa6506fdab315826312bf02253093b12f049
-rw-r--r-- | src/include/ckm/ckm-manager-async.h | 199 | ||||
-rw-r--r-- | src/manager/client-async/client-manager-async-impl.cpp | 165 | ||||
-rw-r--r-- | src/manager/client-async/client-manager-async-impl.h | 89 | ||||
-rw-r--r-- | src/manager/client-async/client-manager-async.cpp | 166 |
4 files changed, 522 insertions, 97 deletions
diff --git a/src/include/ckm/ckm-manager-async.h b/src/include/ckm/ckm-manager-async.h index a6dcc3d8..cb3ce89f 100644 --- a/src/include/ckm/ckm-manager-async.h +++ b/src/include/ckm/ckm-manager-async.h @@ -45,47 +45,37 @@ public: // Observer will observer custom operation. struct Observer { - // Error callback - all errors - // ERROR_API_NOT_SUPPORTED, - // ERROR_API_CONNECTION_LOST, - // ERROR_API_PARSING_ERROR, - // ERROR_API_ALIAS_UNKNOWN virtual void ReceivedError(int error) = 0; virtual void ReceivedSaveKey() {} - - // This will return data - /* - virtual void ReceivedKey(Key && key) {} - virtual void ReceivedCertificate(Certificate && certificate) {} - virtual void ReceivedKeyAliasVector(AliasVector && aliasVector) {} - virtual void ReceivedCertificateAliasVector(AliasVector && aliasVector) {} - - // This callbacks will confirm successful operation virtual void ReceivedSaveCertificate() {} + virtual void ReceivedSaveData() {} + virtual void ReceivedRemovedKey() {} virtual void ReceivedRemovedCertificate() {} + virtual void ReceivedRemovedData() {} - // Added By Dongsun Lee - virtual void ReceivedData(RawBuffer && data) {} - virtual void ReceivedDataAliasVector(AliasVector && aliasVector) {} + virtual void ReceivedKey(Key &&) {} + virtual void ReceivedCertificate(Certificate &&) {} + virtual void ReceivedData(RawBuffer &&) {} + + virtual void ReceivedKeyAliasVector(AliasVector &&) {} + virtual void ReceivedCertificateAliasVector(AliasVector &&) {} + virtual void ReceivedDataAliasVector(AliasVector &&) {} - // This callbacks will confirm successful operation - virtual void ReceivedSaveData() {} - virtual void ReceivedRemovedData() {} virtual void ReceivedCreateKeyPairRSA() {} + virtual void ReceivedCreateKeyPairDSA() {} virtual void ReceivedCreateKeyPairECDSA() {} - virtual void ReceivedCreateSignature(RawBuffer && signature) {} - // TODO: describe status + virtual void ReceivedGetCertificateChain(CertificateShPtrVector &&) {} + + virtual void ReceivedCreateSignature(RawBuffer &&) {} virtual void ReceivedVerifySignature() {} - // TODO: describe status - // Do we need some chain of the certificate? - virtual void ReceivedVerifyCertificate() {} - virtual void ReceivedGetCertiticateChain(CertificateShPtrVector &&certificateVector) {} - virtual void ReceivedStrictCACheck(); - virtual void ReceivedOCSPCheck();*/ + virtual void ReceivedOCSPCheck(int) {} + + virtual void ReceivedAllowAccess() {} + virtual void ReceivedDenyAccess() {} virtual ~Observer() {} }; @@ -94,85 +84,102 @@ public: virtual ~ManagerAsync(); - void saveKey(const ObserverPtr& observer, const Alias& alias, const KeyShPtr& key, const Policy& policy); - - /* - void saveCertificate(Observer *observer, const Alias &alias, const Certificate &cert, const Policy &policy); - - void removeKey(Observer *observer, const Alias &alias); - void removeCertificate(Observer *observer, const Alias &alias); - - void requestKey(Observer *observer, const Alias &alias); - void requestCertificate(Observer *observer, const Alias &alias); - - // This will extract list of all Keys and Certificates in Key Store - void requestKeyAliasVector(Observer *observer); // send request for list of all keys that application/user may use - void requestCertificateAliasVector(Observer *observer); // send request for list of all certs that application/user may use - - // Added By Dongsun Lee - void saveData(Observer *observer, const Alias &alias, const RawBuffer &data, const Policy &policy); - void removeData(Observer *observer, const Alias &alias); - void requestData(Observer *observer, const Alias &alias); - void requestDataAliasVector(Observer *observer); // send request for list of all data that application/user may use - void createKeyPairRSA(Observer *observer, const Alias &privateKeyAlias, const Alias &publicKeyAlias, const int &size, const Policy &policy); - void createKeyPairECDSA(Observer *observer, const Alias &privateKeyAlias, const Alias &publicKeyAlias, ECType type, const int &size, const Policy &policy); - void createSignature(Observer *observer, const Alias &privateKeyAlias, const RawBuffer &password, const RawBuffer &message); - void verifySignature(Observer *observer, const Alias &publicKeyOrCertAlias, const RawBuffer &password, const RawBuffer &message, const RawBuffer &signature); - - // Should we use also certificates stored by user in Certral Key Manager? - // Sometimes we may want to verify certificate without OCSP (for example we are installing side-loaded app and network is not working). - void verifyCertificate(Observer *observer, const Certificate &certificate, const CertificateShPtrVector &untrusted, const bool ocspCheck, const bool strictCaFlagCheck); + void saveKey( + const ObserverPtr& observer, + const Alias& alias, + const KeyShPtr& key, + const Policy& policy); + void saveCertificate( + const ObserverPtr& observer, + const Alias& alias, + const CertificateShPtr& cert, + const Policy& policy); + void saveData( + const ObserverPtr& observer, + const Alias& alias, + const RawBuffer& data, + const Policy& policy); + + void removeKey(const ObserverPtr& observer, const Alias& alias); + void removeCertificate(const ObserverPtr& observer, const Alias& alias); + void removeData(const ObserverPtr& observer, const Alias& alias); + + void getKey(const ObserverPtr& observer, const Alias& alias, const Password& password); + void getCertificate(const ObserverPtr& observer, const Alias& alias, const Password& password); + void getData(const ObserverPtr& observer, const Alias& alias, const Password& password); + + // send request for list of all keys/certificates/data that application/user may use + void getKeyAliasVector(const ObserverPtr& observer); + void getCertificateAliasVector(const ObserverPtr& observer); + void getDataAliasVector(const ObserverPtr& observer); void createKeyPairRSA( - Observer *observer, - const int size, // size in bits [1024, 2048, 4096] - const Alias &privateKeyAlias, - const Alias &publicKeyAlias, - const Policy &policyPrivateKey = Policy(), - const Policy &policyPublicKey = Policy()); - + const ObserverPtr& observer, + int size, + const Alias& privateKeyAlias, + const Alias& publicKeyAlias, + const Policy& policyPrivateKey = Policy(), + const Policy& policyPublicKey = Policy()); + void createKeyPairDSA( + const ObserverPtr& observer, + int size, + const Alias& privateKeyAlias, + const Alias& publicKeyAlias, + const Policy& policyPrivateKey = Policy(), + const Policy& policyPublicKey = Policy()); void createKeyPairECDSA( - Observer *observer, - const Key::ECType type, - const Alias &privateKeyAlias, - const Alias &publicKeyAlias, - const Policy &policyPrivateKey = Policy(), - const Policy &policyPublicKey = Policy()); - - // this fuction will return chains of certificates and check it with openssl - // status : OK, INCOMPLETE_CHAIN, VERIFICATION_FAILED - void getCertiticateChain( - const Certificate &certificate, - const CertificateShPtrVector &untrustedCertificates); + const ObserverPtr& observer, + const ElipticCurve type, + const Alias& privateKeyAlias, + const Alias& publicKeyAlias, + const Policy& policyPrivateKey = Policy(), + const Policy& policyPublicKey = Policy()); void getCertificateChain( - const Certificate &certificate, - const AliasVector &untrustedCertificates); - - void strictCACheck(const CertificateShPtrVector &certificateVector); + const ObserverPtr& observer, + const CertificateShPtr& certificate, + const CertificateShPtrVector& untrustedCertificates); + void getCertificateChain( + const ObserverPtr& observer, + const CertificateShPtr& certificate, + const AliasVector& untrustedCertificates); + + void createSignature( + const ObserverPtr& observer, + const Alias& privateKeyAlias, + const Password& password, // password for private_key + const RawBuffer& message, + const HashAlgorithm hash, + const RSAPaddingAlgorithm padding); + void verifySignature( + const ObserverPtr& observer, + const Alias& publicKeyOrCertAlias, + const Password& password, // password for public_key (optional) + const RawBuffer& message, + const RawBuffer& signature, + const HashAlgorithm hash, + const RSAPaddingAlgorithm padding); // This function will check all certificates in chain except Root CA. - void ocspCheck(const CertificateShPtrVector &certificateChainVector);*/ + // This function will delegate task to service. You may use this even + // if application does not have permission to use network. + void ocspCheck( + const ObserverPtr& observer, + const CertificateShPtrVector& certificateChainVector); + + void allowAccess( + const ObserverPtr& observer, + const std::string& alias, + const std::string& accessor, + AccessRight granted); + void denyAccess( + const ObserverPtr& observer, + const std::string& alias, + const std::string& accessor); private: std::unique_ptr<Impl> m_impl; }; -// Out of scope -/* - class ManagerAsyncNoThread : public ManagerAsync { - public: - ManagerAsyncNoThread(); - ManagerAsyncNoThread(const ConnectionAsyncNoThread &); - ManagerAsyncNoThread(ConnectionAsyncNoThread &&); - ManagerAsyncNoThread& operator=(const ConnectionAsyncNoThread &); - ManagerAsyncNoThread& operator=(ConnectionAsyncNoThread &&); - virtual ~ConnecitonAsyncNoThread() {} - - int getDesc(); // extract descriptor number - int processDesc(); // send request and receive data from central key manager - }; - */ - } // namespace CKM diff --git a/src/manager/client-async/client-manager-async-impl.cpp b/src/manager/client-async/client-manager-async-impl.cpp index 744e3a27..5e991c5d 100644 --- a/src/manager/client-async/client-manager-async-impl.cpp +++ b/src/manager/client-async/client-manager-async-impl.cpp @@ -51,6 +51,171 @@ void ManagerAsync::Impl::saveKey(const ManagerAsync::ObserverPtr& observer, saveBinaryData(observer, alias, toDBDataType(key->getType()), key->getDER(), policy); } +void ManagerAsync::Impl::saveCertificate(const ObserverPtr& observer, + const Alias& /*alias*/, + const CertificateShPtr& /*cert*/, + const Policy& /*policy*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} +void ManagerAsync::Impl::saveData(const ObserverPtr& observer, + const Alias& /*alias*/, + const RawBuffer& /*data*/, + const Policy& /*policy*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::removeKey(const ObserverPtr& observer, const Alias& /*alias*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} +void ManagerAsync::Impl::removeCertificate(const ObserverPtr& observer, const Alias& /*alias*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} +void ManagerAsync::Impl::removeData(const ObserverPtr& observer, const Alias& /*alias*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::getKey(const ObserverPtr& observer, + const Alias& /*alias*/, + const Password& /*password*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} +void ManagerAsync::Impl::getCertificate(const ObserverPtr& observer, + const Alias& /*alias*/, + const Password& /*password*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} +void ManagerAsync::Impl::getData(const ObserverPtr& observer, + const Alias& /*alias*/, + const Password& /*password*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::getKeyAliasVector(const ObserverPtr& observer) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} +void ManagerAsync::Impl::getCertificateAliasVector(const ObserverPtr& observer) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} +void ManagerAsync::Impl::getDataAliasVector(const ObserverPtr& observer) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::createKeyPairRSA(const ObserverPtr& observer, + int /*size*/, + const Alias& /*privateKeyAlias*/, + const Alias& /*publicKeyAlias*/, + const Policy& /*policyPrivateKey*/, + const Policy& /*policyPublicKey*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} +void ManagerAsync::Impl::createKeyPairDSA(const ObserverPtr& observer, + int /*size*/, + const Alias& /*privateKeyAlias*/, + const Alias& /*publicKeyAlias*/, + const Policy& /*policyPrivateKey*/, + const Policy& /*policyPublicKey*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} +void ManagerAsync::Impl::createKeyPairECDSA(const ObserverPtr& observer, + const ElipticCurve /*type*/, + const Alias& /*privateKeyAlias*/, + const Alias& /*publicKeyAlias*/, + const Policy& /*policyPrivateKey*/, + const Policy& /*policyPublicKey*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::getCertificateChain(const ObserverPtr& observer, + const CertificateShPtr& /*certificate*/, + const CertificateShPtrVector& /*untrustedCertificates*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::getCertificateChain(const ObserverPtr& observer, + const CertificateShPtr& /*certificate*/, + const AliasVector& /*untrustedCertificates*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::createSignature(const ObserverPtr& observer, + const Alias& /*privateKeyAlias*/, + const Password& /*password*/, + const RawBuffer& /*message*/, + const HashAlgorithm /*hash*/, + const RSAPaddingAlgorithm /*padding*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::verifySignature(const ObserverPtr& observer, + const Alias& /*publicKeyOrCertAlias*/, + const Password& /*password*/, + const RawBuffer& /*message*/, + const RawBuffer& /*signature*/, + const HashAlgorithm /*hash*/, + const RSAPaddingAlgorithm /*padding*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::ocspCheck(const ObserverPtr& observer, + const CertificateShPtrVector& /*certificateChainVector*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::allowAccess(const ObserverPtr& observer, + const std::string& /*alias*/, + const std::string& /*accessor*/, + AccessRight /*granted*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + +void ManagerAsync::Impl::denyAccess(const ObserverPtr& observer, + const std::string& /*alias*/, + const std::string& /*accessor*/) +{ + observerCheck(observer); + observer->ReceivedError(CKM_API_ERROR_UNKNOWN); +} + void ManagerAsync::Impl::saveBinaryData(const ManagerAsync::ObserverPtr& observer, const Alias& alias, DBDataType dataType, diff --git a/src/manager/client-async/client-manager-async-impl.h b/src/manager/client-async/client-manager-async-impl.h index e3fde09e..d16593fc 100644 --- a/src/manager/client-async/client-manager-async-impl.h +++ b/src/manager/client-async/client-manager-async-impl.h @@ -38,7 +38,94 @@ public: virtual ~Impl(); - void saveKey(const ManagerAsync::ObserverPtr&, const Alias&, const KeyShPtr&, const Policy&); + void saveKey( + const ObserverPtr& observer, + const Alias& alias, + const KeyShPtr& key, + const Policy& policy); + void saveCertificate( + const ObserverPtr& observer, + const Alias& alias, + const CertificateShPtr& cert, + const Policy& policy); + void saveData( + const ObserverPtr& observer, + const Alias& alias, + const RawBuffer& data, + const Policy& policy); + + void removeKey(const ObserverPtr& observer, const Alias& alias); + void removeCertificate(const ObserverPtr& observer, const Alias& alias); + void removeData(const ObserverPtr& observer, const Alias& alias); + + void getKey(const ObserverPtr& observer, const Alias& alias, const Password& password); + void getCertificate(const ObserverPtr& observer, const Alias& alias, const Password& password); + void getData(const ObserverPtr& observer, const Alias& alias, const Password& password); + + void getKeyAliasVector(const ObserverPtr& observer); + void getCertificateAliasVector(const ObserverPtr& observer); + void getDataAliasVector(const ObserverPtr& observer); + + void createKeyPairRSA( + const ObserverPtr& observer, + int size, + const Alias& privateKeyAlias, + const Alias& publicKeyAlias, + const Policy& policyPrivateKey, + const Policy& policyPublicKey); + void createKeyPairDSA( + const ObserverPtr& observer, + int size, + const Alias& privateKeyAlias, + const Alias& publicKeyAlias, + const Policy& policyPrivateKey, + const Policy& policyPublicKey); + void createKeyPairECDSA( + const ObserverPtr& observer, + const ElipticCurve type, + const Alias& privateKeyAlias, + const Alias& publicKeyAlias, + const Policy& policyPrivateKey, + const Policy& policyPublicKey); + + void getCertificateChain( + const ObserverPtr& observer, + const CertificateShPtr& certificate, + const CertificateShPtrVector& untrustedCertificates); + void getCertificateChain( + const ObserverPtr& observer, + const CertificateShPtr& certificate, + const AliasVector& untrustedCertificates); + + void createSignature( + const ObserverPtr& observer, + const Alias& privateKeyAlias, + const Password& password, + const RawBuffer& message, + const HashAlgorithm hash, + const RSAPaddingAlgorithm padding); + void verifySignature( + const ObserverPtr& observer, + const Alias& publicKeyOrCertAlias, + const Password& password, + const RawBuffer& message, + const RawBuffer& signature, + const HashAlgorithm hash, + const RSAPaddingAlgorithm padding); + + void ocspCheck( + const ObserverPtr& observer, + const CertificateShPtrVector& certificateChainVector); + + void allowAccess( + const ObserverPtr& observer, + const std::string& alias, + const std::string& accessor, + AccessRight granted); + void denyAccess( + const ObserverPtr& observer, + const std::string& alias, + const std::string& accessor); private: void saveBinaryData(const ManagerAsync::ObserverPtr& observer, diff --git a/src/manager/client-async/client-manager-async.cpp b/src/manager/client-async/client-manager-async.cpp index 85f376f4..7c747bf2 100644 --- a/src/manager/client-async/client-manager-async.cpp +++ b/src/manager/client-async/client-manager-async.cpp @@ -42,5 +42,171 @@ void ManagerAsync::saveKey(const ObserverPtr& observer, m_impl->saveKey(observer, alias, key, policy); } +void ManagerAsync::saveCertificate(const ObserverPtr& observer, + const Alias& alias, + const CertificateShPtr& cert, + const Policy& policy) +{ + m_impl->saveCertificate(observer, alias, cert, policy); +} + +void ManagerAsync::saveData(const ObserverPtr& observer, + const Alias& alias, + const RawBuffer& data, + const Policy& policy) +{ + m_impl->saveData(observer, alias, data, policy); +} + +void ManagerAsync::removeKey(const ObserverPtr& observer, const Alias& alias) +{ + m_impl->removeKey(observer, alias); +} + +void ManagerAsync::removeCertificate(const ObserverPtr& observer, const Alias& alias) +{ + m_impl->removeCertificate(observer, alias); +} + +void ManagerAsync::removeData(const ObserverPtr& observer, const Alias& alias) +{ + m_impl->removeData(observer, alias); +} + +void ManagerAsync::getKey(const ObserverPtr& observer, const Alias& alias, const Password& password) +{ + m_impl->getKey(observer, alias, password); +} + +void ManagerAsync::getCertificate(const ObserverPtr& observer, + const Alias& alias, + const Password& password) +{ + m_impl->getCertificate(observer, alias, password); +} + +void ManagerAsync::getData(const ObserverPtr& observer, + const Alias& alias, + const Password& password) +{ + m_impl->getData(observer, alias, password); +} + +void ManagerAsync::getKeyAliasVector(const ObserverPtr& observer) +{ + m_impl->getKeyAliasVector(observer); +} + +void ManagerAsync::getCertificateAliasVector(const ObserverPtr& observer) +{ + m_impl->getCertificateAliasVector(observer); +} + +void ManagerAsync::getDataAliasVector(const ObserverPtr& observer) +{ + m_impl->getDataAliasVector(observer); +} + +void ManagerAsync::createKeyPairRSA(const ObserverPtr& observer, + int size, + const Alias& privateKeyAlias, + const Alias& publicKeyAlias, + const Policy& policyPrivateKey, + const Policy& policyPublicKey) +{ + m_impl->createKeyPairRSA(observer, + size, + privateKeyAlias, + publicKeyAlias, + policyPrivateKey, + policyPublicKey); +} + +void ManagerAsync::createKeyPairDSA(const ObserverPtr& observer, + int size, + const Alias& privateKeyAlias, + const Alias& publicKeyAlias, + const Policy& policyPrivateKey, + const Policy& policyPublicKey) +{ + m_impl->createKeyPairDSA(observer, + size, + privateKeyAlias, + publicKeyAlias, + policyPrivateKey, + policyPublicKey); +} + +void ManagerAsync::createKeyPairECDSA(const ObserverPtr& observer, + const ElipticCurve type, + const Alias& privateKeyAlias, + const Alias& publicKeyAlias, + const Policy& policyPrivateKey, + const Policy& policyPublicKey) +{ + m_impl->createKeyPairECDSA(observer, + type, + privateKeyAlias, + publicKeyAlias, + policyPrivateKey, + policyPublicKey); +} + +void ManagerAsync::getCertificateChain(const ObserverPtr& observer, + const CertificateShPtr& certificate, + const CertificateShPtrVector& untrustedCertificates) +{ + m_impl->getCertificateChain(observer, certificate, untrustedCertificates); +} + +void ManagerAsync::getCertificateChain(const ObserverPtr& observer, + const CertificateShPtr& certificate, + const AliasVector& untrustedCertificates) +{ + m_impl->getCertificateChain(observer, certificate, untrustedCertificates); +} + +void ManagerAsync::createSignature(const ObserverPtr& observer, + const Alias& privateKeyAlias, + const Password& password, + const RawBuffer& message, + const HashAlgorithm hash, + const RSAPaddingAlgorithm padding) +{ + m_impl->createSignature(observer, privateKeyAlias, password, message, hash, padding); +} + +void ManagerAsync::verifySignature(const ObserverPtr& observer, + const Alias& publicKeyOrCertAlias, + const Password& password, + const RawBuffer& message, + const RawBuffer& signature, + const HashAlgorithm hash, + const RSAPaddingAlgorithm padding) +{ + m_impl->verifySignature(observer, publicKeyOrCertAlias, password, message, signature, hash, padding); +} + +void ManagerAsync::ocspCheck(const ObserverPtr& observer, + const CertificateShPtrVector& certificateChainVector) +{ + m_impl->ocspCheck(observer, certificateChainVector); +} + +void ManagerAsync::allowAccess(const ObserverPtr& observer, + const std::string& alias, + const std::string& accessor, + AccessRight granted) +{ + m_impl->allowAccess(observer, alias, accessor, granted); +} + +void ManagerAsync::denyAccess(const ObserverPtr& observer, + const std::string& alias, + const std::string& accessor) +{ + m_impl->denyAccess(observer, alias, accessor); +} + } // namespace CKM |