]> git.saurik.com Git - apple/security.git/blobdiff - Keychain/IdentityCursor.cpp
Security-222.tar.gz
[apple/security.git] / Keychain / IdentityCursor.cpp
diff --git a/Keychain/IdentityCursor.cpp b/Keychain/IdentityCursor.cpp
deleted file mode 100644 (file)
index 92907da..0000000
+++ /dev/null
@@ -1,110 +0,0 @@
-/*
- * Copyright (c) 2002 Apple Computer, Inc. All Rights Reserved.
- * 
- * The contents of this file constitute Original Code as defined in and are
- * subject to the Apple Public Source License Version 1.2 (the 'License').
- * You may not use this file except in compliance with the License. Please obtain
- * a copy of the License at http://www.apple.com/publicsource and read it before
- * using this file.
- * 
- * This Original Code and all software distributed under the License are
- * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
- * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
- * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
- * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
- * specific language governing rights and limitations under the License.
- */
-
-
-/*
-       File:           IdentityCursor.cpp
-
-       Contains:       Working with IdentityCursor
-
-       Copyright:      2002 by Apple Computer, Inc., all rights reserved.
-
-       To Do:
-*/
-
-#include <Security/IdentityCursor.h>
-#include <Security/Identity.h>
-#include <Security/Item.h>
-#include <Security/Certificate.h>
-#include <Security/KeyItem.h>
-#include <Security/Schema.h>
-
-// From AppleCSPDL
-#include <Security/KeySchema.h>
-
-using namespace KeychainCore;
-
-IdentityCursor::IdentityCursor(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage) :
-       mSearchList(searchList),
-       mKeyCursor(mSearchList, CSSM_DL_DB_RECORD_PRIVATE_KEY, NULL)
-{
-       // If keyUsage is CSSM_KEYUSE_ANY then we need a key that can do everything
-       if (keyUsage & CSSM_KEYUSE_ANY)
-               keyUsage = CSSM_KEYUSE_ENCRYPT | CSSM_KEYUSE_DECRYPT
-                                                  | CSSM_KEYUSE_DERIVE | CSSM_KEYUSE_SIGN
-                                                  | CSSM_KEYUSE_VERIFY | CSSM_KEYUSE_SIGN_RECOVER
-                                                  | CSSM_KEYUSE_VERIFY_RECOVER | CSSM_KEYUSE_WRAP
-                                                  | CSSM_KEYUSE_UNWRAP;
-
-       if (keyUsage & CSSM_KEYUSE_ENCRYPT)
-               mKeyCursor->add(CSSM_DB_EQUAL, KeySchema::Encrypt, true);
-       if (keyUsage & CSSM_KEYUSE_DECRYPT)
-               mKeyCursor->add(CSSM_DB_EQUAL, KeySchema::Decrypt, true);
-       if (keyUsage & CSSM_KEYUSE_DERIVE)
-               mKeyCursor->add(CSSM_DB_EQUAL, KeySchema::Derive, true);
-       if (keyUsage & CSSM_KEYUSE_SIGN)
-               mKeyCursor->add(CSSM_DB_EQUAL, KeySchema::Sign, true);
-       if (keyUsage & CSSM_KEYUSE_VERIFY)
-               mKeyCursor->add(CSSM_DB_EQUAL, KeySchema::Verify, true);
-       if (keyUsage & CSSM_KEYUSE_SIGN_RECOVER)
-               mKeyCursor->add(CSSM_DB_EQUAL, KeySchema::SignRecover, true);
-       if (keyUsage & CSSM_KEYUSE_VERIFY_RECOVER)
-               mKeyCursor->add(CSSM_DB_EQUAL, KeySchema::VerifyRecover, true);
-       if (keyUsage & CSSM_KEYUSE_WRAP)
-               mKeyCursor->add(CSSM_DB_EQUAL, KeySchema::Wrap, true);
-       if (keyUsage & CSSM_KEYUSE_UNWRAP)
-               mKeyCursor->add(CSSM_DB_EQUAL, KeySchema::Unwrap, true);
-}
-
-IdentityCursor::~IdentityCursor() throw()
-{
-}
-
-bool
-IdentityCursor::next(SecPointer<Identity> &identity)
-{
-       for (;;)
-       {
-               if (!mCertificateCursor)
-               {
-                       Item key;
-                       if (!mKeyCursor->next(key))
-                               return false;
-       
-                       mCurrentKey = static_cast<KeyItem *>(key.get());
-
-                       CssmClient::DbUniqueRecord uniqueId = mCurrentKey->dbUniqueRecord();
-                       CssmClient::DbAttributes dbAttributes(uniqueId->database(), 1);
-                       dbAttributes.add(KeySchema::Label);
-                       uniqueId->get(&dbAttributes, NULL);
-                       const CssmData &keyHash = dbAttributes[0];
-
-                       mCertificateCursor = KCCursor(mSearchList, CSSM_DL_DB_RECORD_X509_CERTIFICATE, NULL);
-                       mCertificateCursor->add(CSSM_DB_EQUAL, Schema::kX509CertificatePublicKeyHash, keyHash);
-               }
-       
-               Item cert;
-               if (mCertificateCursor->next(cert))
-               {
-                       SecPointer<Certificate> certificate(static_cast<Certificate *>(cert.get()));
-                       identity = new Identity(mCurrentKey, certificate);
-                       return true;
-               }
-               else
-                       mCertificateCursor = KCCursor();
-       }
-}