summaryrefslogtreecommitdiffstats
path: root/neethi/src/secpolicy/model/supporting_tokens.c
diff options
context:
space:
mode:
Diffstat (limited to 'neethi/src/secpolicy/model/supporting_tokens.c')
-rw-r--r--neethi/src/secpolicy/model/supporting_tokens.c300
1 files changed, 300 insertions, 0 deletions
diff --git a/neethi/src/secpolicy/model/supporting_tokens.c b/neethi/src/secpolicy/model/supporting_tokens.c
new file mode 100644
index 0000000..7ec2d7f
--- /dev/null
+++ b/neethi/src/secpolicy/model/supporting_tokens.c
@@ -0,0 +1,300 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements. See the NOTICE file distributed with
+ * this work for additional information regarding copyright ownership.
+ * The ASF licenses this file to You under the Apache License, Version 2.0
+ * (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include <rp_supporting_tokens.h>
+
+struct rp_supporting_tokens_t
+{
+ rp_algorithmsuite_t *algorithmsuite;
+ axutil_array_list_t *tokens;
+ rp_signed_encrypted_elements_t *signed_elements;
+ rp_signed_encrypted_parts_t *signed_parts;
+ rp_signed_encrypted_elements_t *encrypted_elements;
+ rp_signed_encrypted_parts_t *encrypted_parts;
+ int type;
+ int ref;
+};
+
+AXIS2_EXTERN rp_supporting_tokens_t *AXIS2_CALL
+rp_supporting_tokens_create(
+ const axutil_env_t * env)
+{
+ rp_supporting_tokens_t *supporting_tokens = NULL;
+
+ AXIS2_ENV_CHECK(env, NULL);
+
+ supporting_tokens = (rp_supporting_tokens_t *)AXIS2_MALLOC(env->allocator,
+ sizeof(rp_supporting_tokens_t));
+
+ if(supporting_tokens == NULL)
+ {
+ AXIS2_ERROR_SET(env->error, AXIS2_ERROR_NO_MEMORY, AXIS2_FAILURE);
+ return NULL;
+ }
+ supporting_tokens->tokens = NULL;
+ supporting_tokens->tokens = axutil_array_list_create(env, 0);
+ if(!(supporting_tokens->tokens))
+ {
+ rp_supporting_tokens_free(supporting_tokens, env);
+ AXIS2_ERROR_SET(env->error, AXIS2_ERROR_NO_MEMORY, AXIS2_FAILURE);
+ return NULL;
+ }
+
+ supporting_tokens->algorithmsuite = NULL;
+ supporting_tokens->signed_parts = NULL;
+ supporting_tokens->signed_elements = NULL;
+ supporting_tokens->encrypted_parts = NULL;
+ supporting_tokens->encrypted_elements = NULL;
+ supporting_tokens->type = 0;
+ supporting_tokens->ref = 0;
+ return supporting_tokens;
+}
+
+AXIS2_EXTERN void AXIS2_CALL
+rp_supporting_tokens_free(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+
+ if(supporting_tokens)
+ {
+
+ if(--(supporting_tokens->ref) > 0)
+ {
+ return;
+ }
+
+ if(supporting_tokens->tokens)
+ {
+ int i = 0;
+ for(i = 0; i < axutil_array_list_size(supporting_tokens->tokens, env); i++)
+ {
+ rp_property_t *token = NULL;
+ token = (rp_property_t *)axutil_array_list_get(supporting_tokens->tokens, env, i);
+ if(token)
+ rp_property_free(token, env);
+
+ token = NULL;
+ }
+ axutil_array_list_free(supporting_tokens->tokens, env);
+ supporting_tokens->tokens = NULL;
+
+ }
+ if(supporting_tokens->algorithmsuite)
+ {
+ rp_algorithmsuite_free(supporting_tokens->algorithmsuite, env);
+ supporting_tokens->algorithmsuite = NULL;
+ }
+ if(supporting_tokens->signed_parts)
+ {
+ rp_signed_encrypted_parts_free(supporting_tokens->signed_parts, env);
+ supporting_tokens->signed_parts = NULL;
+ }
+ if(supporting_tokens->signed_elements)
+ {
+ rp_signed_encrypted_elements_free(supporting_tokens-> signed_elements, env);
+ supporting_tokens->signed_elements = NULL;
+ }
+ if(supporting_tokens->encrypted_parts)
+ {
+ rp_signed_encrypted_parts_free(supporting_tokens->encrypted_parts, env);
+ supporting_tokens->encrypted_parts = NULL;
+ }
+ if(supporting_tokens->encrypted_elements)
+ {
+ rp_signed_encrypted_elements_free(supporting_tokens-> encrypted_elements, env);
+ supporting_tokens->encrypted_elements = NULL;
+ }
+ AXIS2_FREE(env->allocator, supporting_tokens);
+ supporting_tokens = NULL;
+ }
+ return;
+}
+
+/* Implementations */
+
+AXIS2_EXTERN axutil_array_list_t *AXIS2_CALL
+rp_supporting_tokens_get_tokens(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+
+ return supporting_tokens->tokens;
+}
+
+AXIS2_EXTERN axis2_status_t AXIS2_CALL
+rp_supporting_tokens_add_token(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env,
+ rp_property_t * token)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+ AXIS2_PARAM_CHECK(env->error, token, AXIS2_FAILURE);
+
+ rp_property_increment_ref(token, env);
+ axutil_array_list_add(supporting_tokens->tokens, env, token);
+ return AXIS2_SUCCESS;
+}
+
+AXIS2_EXTERN rp_algorithmsuite_t *AXIS2_CALL
+rp_supporting_tokens_get_algorithmsuite(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env)
+{
+ AXIS2_ENV_CHECK(env, NULL);
+
+ return supporting_tokens->algorithmsuite;
+}
+
+AXIS2_EXTERN axis2_status_t AXIS2_CALL
+rp_supporting_tokens_set_algorithmsuite(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env,
+ rp_algorithmsuite_t * algorithmsuite)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+ AXIS2_PARAM_CHECK(env->error, algorithmsuite, AXIS2_FAILURE);
+
+ rp_algorithmsuite_increment_ref(algorithmsuite, env);
+ supporting_tokens->algorithmsuite = algorithmsuite;
+ return AXIS2_SUCCESS;
+}
+
+AXIS2_EXTERN rp_signed_encrypted_parts_t *AXIS2_CALL
+rp_supporting_tokens_get_signed_parts(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env)
+{
+ AXIS2_ENV_CHECK(env, NULL);
+
+ return supporting_tokens->signed_parts;
+}
+
+AXIS2_EXTERN axis2_status_t AXIS2_CALL
+rp_supporting_tokens_set_signed_parts(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env,
+ rp_signed_encrypted_parts_t * signed_parts)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+ AXIS2_PARAM_CHECK(env->error, signed_parts, AXIS2_FAILURE);
+
+ supporting_tokens->signed_parts = signed_parts;
+ return AXIS2_SUCCESS;
+}
+
+AXIS2_EXTERN rp_signed_encrypted_elements_t *AXIS2_CALL
+rp_supporting_tokens_get_signed_elements(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env)
+{
+ AXIS2_ENV_CHECK(env, NULL);
+
+ return supporting_tokens->signed_elements;
+}
+
+AXIS2_EXTERN axis2_status_t AXIS2_CALL
+rp_supporting_tokens_set_signed_elements(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env,
+ rp_signed_encrypted_elements_t * signed_elements)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+ AXIS2_PARAM_CHECK(env->error, signed_elements, AXIS2_FAILURE);
+
+ supporting_tokens->signed_elements = signed_elements;
+ return AXIS2_SUCCESS;
+}
+
+AXIS2_EXTERN rp_signed_encrypted_parts_t *AXIS2_CALL
+rp_supporting_tokens_get_encrypted_parts(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env)
+{
+ AXIS2_ENV_CHECK(env, NULL);
+
+ return supporting_tokens->encrypted_parts;
+}
+
+AXIS2_EXTERN axis2_status_t AXIS2_CALL
+rp_supporting_tokens_set_encrypted_parts(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env,
+ rp_signed_encrypted_parts_t * encrypted_parts)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+ AXIS2_PARAM_CHECK(env->error, encrypted_parts, AXIS2_FAILURE);
+
+ supporting_tokens->encrypted_parts = encrypted_parts;
+ return AXIS2_SUCCESS;
+}
+
+AXIS2_EXTERN rp_signed_encrypted_elements_t *AXIS2_CALL
+rp_supporting_tokens_get_encrypted_elements(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+
+ return supporting_tokens->encrypted_elements;
+}
+
+AXIS2_EXTERN axis2_status_t AXIS2_CALL
+rp_supporting_tokens_set_encrypted_elements(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env,
+ rp_signed_encrypted_elements_t * encrypted_elements)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+ AXIS2_PARAM_CHECK(env->error, encrypted_elements, AXIS2_FAILURE);
+
+ supporting_tokens->encrypted_elements = encrypted_elements;
+ return AXIS2_SUCCESS;
+}
+
+AXIS2_EXTERN int AXIS2_CALL
+rp_supporting_tokens_get_type(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+
+ return supporting_tokens->type;
+}
+
+AXIS2_EXTERN axis2_status_t AXIS2_CALL
+rp_supporting_tokens_set_type(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env,
+ int type)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+ supporting_tokens->type = type;
+ return AXIS2_SUCCESS;
+}
+
+AXIS2_EXTERN axis2_status_t AXIS2_CALL
+rp_supporting_tokens_increment_ref(
+ rp_supporting_tokens_t * supporting_tokens,
+ const axutil_env_t * env)
+{
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+ supporting_tokens->ref++;
+ return AXIS2_SUCCESS;
+}