/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #include #include #include #include using namespace Aws::Utils; namespace Aws { namespace KMS { namespace Model { namespace SigningAlgorithmSpecMapper { static const int RSASSA_PSS_SHA_256_HASH = HashingUtils::HashString("RSASSA_PSS_SHA_256"); static const int RSASSA_PSS_SHA_384_HASH = HashingUtils::HashString("RSASSA_PSS_SHA_384"); static const int RSASSA_PSS_SHA_512_HASH = HashingUtils::HashString("RSASSA_PSS_SHA_512"); static const int RSASSA_PKCS1_V1_5_SHA_256_HASH = HashingUtils::HashString("RSASSA_PKCS1_V1_5_SHA_256"); static const int RSASSA_PKCS1_V1_5_SHA_384_HASH = HashingUtils::HashString("RSASSA_PKCS1_V1_5_SHA_384"); static const int RSASSA_PKCS1_V1_5_SHA_512_HASH = HashingUtils::HashString("RSASSA_PKCS1_V1_5_SHA_512"); static const int ECDSA_SHA_256_HASH = HashingUtils::HashString("ECDSA_SHA_256"); static const int ECDSA_SHA_384_HASH = HashingUtils::HashString("ECDSA_SHA_384"); static const int ECDSA_SHA_512_HASH = HashingUtils::HashString("ECDSA_SHA_512"); static const int SM2DSA_HASH = HashingUtils::HashString("SM2DSA"); SigningAlgorithmSpec GetSigningAlgorithmSpecForName(const Aws::String& name) { int hashCode = HashingUtils::HashString(name.c_str()); if (hashCode == RSASSA_PSS_SHA_256_HASH) { return SigningAlgorithmSpec::RSASSA_PSS_SHA_256; } else if (hashCode == RSASSA_PSS_SHA_384_HASH) { return SigningAlgorithmSpec::RSASSA_PSS_SHA_384; } else if (hashCode == RSASSA_PSS_SHA_512_HASH) { return SigningAlgorithmSpec::RSASSA_PSS_SHA_512; } else if (hashCode == RSASSA_PKCS1_V1_5_SHA_256_HASH) { return SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_256; } else if (hashCode == RSASSA_PKCS1_V1_5_SHA_384_HASH) { return SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_384; } else if (hashCode == RSASSA_PKCS1_V1_5_SHA_512_HASH) { return SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_512; } else if (hashCode == ECDSA_SHA_256_HASH) { return SigningAlgorithmSpec::ECDSA_SHA_256; } else if (hashCode == ECDSA_SHA_384_HASH) { return SigningAlgorithmSpec::ECDSA_SHA_384; } else if (hashCode == ECDSA_SHA_512_HASH) { return SigningAlgorithmSpec::ECDSA_SHA_512; } else if (hashCode == SM2DSA_HASH) { return SigningAlgorithmSpec::SM2DSA; } EnumParseOverflowContainer* overflowContainer = Aws::GetEnumOverflowContainer(); if(overflowContainer) { overflowContainer->StoreOverflow(hashCode, name); return static_cast(hashCode); } return SigningAlgorithmSpec::NOT_SET; } Aws::String GetNameForSigningAlgorithmSpec(SigningAlgorithmSpec enumValue) { switch(enumValue) { case SigningAlgorithmSpec::RSASSA_PSS_SHA_256: return "RSASSA_PSS_SHA_256"; case SigningAlgorithmSpec::RSASSA_PSS_SHA_384: return "RSASSA_PSS_SHA_384"; case SigningAlgorithmSpec::RSASSA_PSS_SHA_512: return "RSASSA_PSS_SHA_512"; case SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_256: return "RSASSA_PKCS1_V1_5_SHA_256"; case SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_384: return "RSASSA_PKCS1_V1_5_SHA_384"; case SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_512: return "RSASSA_PKCS1_V1_5_SHA_512"; case SigningAlgorithmSpec::ECDSA_SHA_256: return "ECDSA_SHA_256"; case SigningAlgorithmSpec::ECDSA_SHA_384: return "ECDSA_SHA_384"; case SigningAlgorithmSpec::ECDSA_SHA_512: return "ECDSA_SHA_512"; case SigningAlgorithmSpec::SM2DSA: return "SM2DSA"; default: EnumParseOverflowContainer* overflowContainer = Aws::GetEnumOverflowContainer(); if(overflowContainer) { return overflowContainer->RetrieveOverflow(static_cast(enumValue)); } return {}; } } } // namespace SigningAlgorithmSpecMapper } // namespace Model } // namespace KMS } // namespace Aws