blob: d099ede789fb3cc07b3753411f5c312862834cbd (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
|
// **********************************************************************
//
// Copyright (c) 2001
// MutableRealms, Inc.
// Huntsville, AL, USA
//
// All Rights Reserved
//
// **********************************************************************
#include <IceUtil/Config.h>
#include <IceUtil/Base64.h>
#include <Ice/RSAPrivateKey.h>
#include <Ice/SslIceUtils.h>
#include <Ice/OpenSSLUtils.h>
#include <Ice/SslException.h>
#include <assert.h>
void ::IceInternal::incRef(::IceSSL::OpenSSL::RSAPrivateKey* p) { p->__incRef(); }
void ::IceInternal::decRef(::IceSSL::OpenSSL::RSAPrivateKey* p) { p->__decRef(); }
using std::back_inserter;
using std::string;
using Ice::ByteSeq;
using IceUtil::Base64;
IceSSL::OpenSSL::RSAPrivateKey::RSAPrivateKey(const string& key)
{
assert(!key.empty());
_privateKey = 0;
ByteSeq keySeq = Base64::decode(key);
byteSeqToKey(keySeq);
}
IceSSL::OpenSSL::RSAPrivateKey::RSAPrivateKey(const ByteSeq& keySeq)
{
assert(!keySeq.empty());
_privateKey = 0;
byteSeqToKey(keySeq);
}
IceSSL::OpenSSL::RSAPrivateKey::RSAPrivateKey(RSA* rsa) :
_privateKey(rsa)
{
assert(_privateKey != 0);
}
IceSSL::OpenSSL::RSAPrivateKey::~RSAPrivateKey()
{
if (_privateKey != 0)
{
RSA_free(_privateKey);
}
}
void
IceSSL::OpenSSL::RSAPrivateKey::keyToBase64(string& b64Key)
{
ByteSeq keySeq;
keyToByteSeq(keySeq);
b64Key = Base64::encode(keySeq);
}
void
IceSSL::OpenSSL::RSAPrivateKey::keyToByteSeq(ByteSeq& keySeq)
{
assert(_privateKey);
// Output the Private Key to a char buffer
unsigned int privKeySize = i2d_RSAPrivateKey(_privateKey, 0);
assert(privKeySize > 0);
unsigned char* privateKeyBuffer = new unsigned char[privKeySize];
assert(privateKeyBuffer != 0);
// We have to do this because i2d_RSAPrivateKey changes the pointer.
unsigned char* privKeyBuff = privateKeyBuffer;
i2d_RSAPrivateKey(_privateKey, &privKeyBuff);
IceSSL::ucharToByteSeq(privateKeyBuffer, privKeySize, keySeq);
delete [] privateKeyBuffer;
}
RSA*
IceSSL::OpenSSL::RSAPrivateKey::get() const
{
return _privateKey;
}
void
IceSSL::OpenSSL::RSAPrivateKey::byteSeqToKey(const ByteSeq& keySeq)
{
unsigned char* privateKeyBuffer = byteSeqToUChar(keySeq);
assert(privateKeyBuffer != 0);
unsigned char* privKeyBuff = privateKeyBuffer;
unsigned char** privKeyBuffpp = &privKeyBuff;
RSA** rsapp = &_privateKey;
_privateKey = d2i_RSAPrivateKey(rsapp, privKeyBuffpp, (long)keySeq.size());
if (_privateKey == 0)
{
IceSSL::PrivateKeyParseException pkParseException(__FILE__, __LINE__);
pkParseException._message = "unable to parse provided private key\n" + sslGetErrors();
throw pkParseException;
}
// ML: Not deleted if an exception is raised!
delete [] privateKeyBuffer;
}
|