#include <xmltooling/encryption/Decrypter.h>
Public Member Functions | |
Decrypter (const xmltooling::CredentialResolver *credResolver=0, xmltooling::CredentialCriteria *criteria=0, const EncryptedKeyResolver *EKResolver=0, bool requireAuthenticatedCipher=false) | |
Constructor. | |
void | setEncryptedKeyResolver (const EncryptedKeyResolver *EKResolver) |
Replace the current EncryptedKeyResolver interface, if any, with a new one. | |
void | setKEKResolver (const xmltooling::CredentialResolver *resolver, xmltooling::CredentialCriteria *criteria) |
Replace the current CredentialResolver interface, if any, with a new one. | |
xercesc::DOMDocumentFragment * | decryptData (const EncryptedData &encryptedData, XSECCryptoKey *key) |
Decrypts the supplied information using the supplied key, and returns the resulting as a DOM fragment owned by the document associated with the marshalled EncryptedData object. | |
xercesc::DOMDocumentFragment * | decryptData (const EncryptedData &encryptedData, const XMLCh *recipient=0) |
Decrypts the supplied information and returns the resulting as a DOM fragment owned by the document associated with the marshalled EncryptedData object. | |
void | decryptData (std::ostream &out, const EncryptedData &encryptedData, XSECCryptoKey *key) |
Decrypts the supplied information to an output stream. | |
void | decryptData (std::ostream &out, const EncryptedData &encryptedData, const XMLCh *recipient=0) |
Decrypts the supplied information to an output stream. | |
XSECCryptoKey * | decryptKey (const EncryptedKey &encryptedKey, const XMLCh *algorithm) |
Decrypts the supplied information and returns the resulting key. |
|
Constructor. The final boolean parameter is used to enforce a requirement for an authenticated cipher suite such as AES-GCM or similar. These ciphers include an HMAC or equivalent step that prevents tampering. Newer applications should set this parameter to true unless the ciphertext has been independently authenticated, and even in such a case, it is rarely possible to prevent chosen ciphertext attacks by trusted signers.
|
|
Decrypts the supplied information to an output stream.
|
|
Decrypts the supplied information to an output stream.
|
|
Decrypts the supplied information and returns the resulting as a DOM fragment owned by the document associated with the marshalled EncryptedData object. Note that the DOM nodes will be invalidated once that document is released. The caller should therefore process the DOM fragment as required and drop all references to it before that happens. The usual approach should be to unmarshall the DOM and then release it, or the DOM can also be imported into a separately owned document.
|
|
Decrypts the supplied information using the supplied key, and returns the resulting as a DOM fragment owned by the document associated with the marshalled EncryptedData object. Note that the DOM nodes will be invalidated once that document is released. The caller should therefore process the DOM fragment as required and drop all references to it before that happens. The usual approach should be to unmarshall the DOM and then release it, or the DOM can also be imported into a separately owned document.
|
|
Decrypts the supplied information and returns the resulting key. The caller is responsible for deleting the key. The algorithm of the key must be supplied by the caller based on knowledge of the associated EncryptedData information.
|
|
Replace the current EncryptedKeyResolver interface, if any, with a new one.
|
|
Replace the current CredentialResolver interface, if any, with a new one.
|