/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include struct rp_secpolicy_t { rp_property_t *binding; rp_property_t *wss; rp_trust10_t *trust10; rp_supporting_tokens_t *supporting_tokens; rp_supporting_tokens_t *signed_supporting_tokens; rp_supporting_tokens_t *endorsing_supporting_tokens; rp_supporting_tokens_t *signed_endorsing_supporting_tokens; rp_signed_encrypted_parts_t *signed_parts; rp_signed_encrypted_parts_t *encrypted_parts; rp_signed_encrypted_elements_t *signed_elements; rp_signed_encrypted_elements_t *encrypted_elements; rp_signed_encrypted_items_t *signed_items; rp_signed_encrypted_items_t *encrypted_items; rp_rampart_config_t *rampart_config; }; AXIS2_EXTERN rp_secpolicy_t *AXIS2_CALL rp_secpolicy_create( const axutil_env_t * env) { rp_secpolicy_t *secpolicy = NULL; AXIS2_ENV_CHECK(env, NULL); secpolicy = (rp_secpolicy_t *)AXIS2_MALLOC(env->allocator, sizeof(rp_secpolicy_t)); if(secpolicy == NULL) { AXIS2_ERROR_SET(env->error, AXIS2_ERROR_NO_MEMORY, AXIS2_FAILURE); return NULL; } secpolicy->binding = NULL; secpolicy->wss = NULL; secpolicy->trust10 = NULL; secpolicy->supporting_tokens = NULL; secpolicy->signed_supporting_tokens = NULL; secpolicy->endorsing_supporting_tokens = NULL; secpolicy->signed_endorsing_supporting_tokens = NULL; secpolicy->signed_parts = NULL; secpolicy->encrypted_parts = NULL; secpolicy->signed_elements = NULL; secpolicy->encrypted_elements = NULL; secpolicy->signed_items = NULL; secpolicy->encrypted_items = NULL; secpolicy->rampart_config = NULL; return secpolicy; } AXIS2_EXTERN void AXIS2_CALL rp_secpolicy_free( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); if(secpolicy) { if(secpolicy->binding) { rp_property_free(secpolicy->binding, env); secpolicy->binding = NULL; } if(secpolicy->wss) { rp_property_free(secpolicy->wss, env); secpolicy->wss = NULL; } if(secpolicy->trust10) { rp_trust10_free(secpolicy->trust10, env); secpolicy->trust10 = NULL; } if(secpolicy->supporting_tokens) { rp_supporting_tokens_free(secpolicy->supporting_tokens, env); secpolicy->supporting_tokens = NULL; } if(secpolicy->signed_supporting_tokens) { rp_supporting_tokens_free(secpolicy->signed_supporting_tokens, env); secpolicy->signed_supporting_tokens = NULL; } if(secpolicy->endorsing_supporting_tokens) { rp_supporting_tokens_free(secpolicy->endorsing_supporting_tokens, env); secpolicy->endorsing_supporting_tokens = NULL; } if(secpolicy->signed_endorsing_supporting_tokens) { rp_supporting_tokens_free(secpolicy-> signed_endorsing_supporting_tokens, env); secpolicy->signed_endorsing_supporting_tokens = NULL; } if(secpolicy->signed_parts) { rp_signed_encrypted_parts_free(secpolicy->signed_parts, env); secpolicy->signed_parts = NULL; } if(secpolicy->encrypted_parts) { rp_signed_encrypted_parts_free(secpolicy->encrypted_parts, env); secpolicy->encrypted_parts = NULL; } if(secpolicy->signed_elements) { rp_signed_encrypted_elements_free(secpolicy->signed_elements, env); secpolicy->signed_elements = NULL; } if(secpolicy->encrypted_elements) { rp_signed_encrypted_elements_free(secpolicy->encrypted_elements, env); secpolicy->encrypted_elements = NULL; } if(secpolicy->signed_items) { rp_signed_encrypted_items_free(secpolicy->signed_items, env); secpolicy->signed_items = NULL; } if(secpolicy->encrypted_items) { rp_signed_encrypted_items_free(secpolicy->encrypted_items, env); secpolicy->encrypted_items = NULL; } if(secpolicy->rampart_config) { rp_rampart_config_free(secpolicy->rampart_config, env); secpolicy->rampart_config = NULL; } AXIS2_FREE(env->allocator, secpolicy); } return; } /* Implementations */ AXIS2_EXTERN rp_property_t *AXIS2_CALL rp_secpolicy_get_binding( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->binding; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_binding( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_property_t * binding) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, binding, AXIS2_FAILURE); rp_property_increment_ref(binding, env); secpolicy->binding = binding; return AXIS2_SUCCESS; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_supporting_tokens( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_supporting_tokens_t * supporting_tokens) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, supporting_tokens, AXIS2_FAILURE); rp_supporting_tokens_increment_ref(supporting_tokens, env); secpolicy->supporting_tokens = supporting_tokens; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_supporting_tokens_t *AXIS2_CALL rp_secpolicy_get_supporting_tokens( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->supporting_tokens; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_signed_supporting_tokens( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_supporting_tokens_t * signed_supporting_tokens) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, signed_supporting_tokens, AXIS2_FAILURE); rp_supporting_tokens_increment_ref(signed_supporting_tokens, env); secpolicy->signed_supporting_tokens = signed_supporting_tokens; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_supporting_tokens_t *AXIS2_CALL rp_secpolicy_get_signed_supporting_tokens( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->signed_supporting_tokens; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_endorsing_supporting_tokens( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_supporting_tokens_t * endorsing_supporting_tokens) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, endorsing_supporting_tokens, AXIS2_FAILURE); rp_supporting_tokens_increment_ref(endorsing_supporting_tokens, env); secpolicy->endorsing_supporting_tokens = endorsing_supporting_tokens; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_supporting_tokens_t *AXIS2_CALL rp_secpolicy_get_endorsing_supporting_tokens( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->endorsing_supporting_tokens; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_signed_endorsing_supporting_tokens( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_supporting_tokens_t * signed_endorsing_supporting_tokens) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, signed_endorsing_supporting_tokens, AXIS2_FAILURE); rp_supporting_tokens_increment_ref(signed_endorsing_supporting_tokens, env); secpolicy->signed_endorsing_supporting_tokens = signed_endorsing_supporting_tokens; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_supporting_tokens_t *AXIS2_CALL rp_secpolicy_get_signed_endorsing_supporting_tokens( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->signed_endorsing_supporting_tokens; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_signed_parts( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_signed_encrypted_parts_t * signed_parts) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, signed_parts, AXIS2_FAILURE); rp_signed_encrypted_parts_increment_ref(signed_parts, env); secpolicy->signed_parts = signed_parts; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_signed_encrypted_parts_t *AXIS2_CALL rp_secpolicy_get_signed_parts( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->signed_parts; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_encrypted_parts( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_signed_encrypted_parts_t * encrypted_parts) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, encrypted_parts, AXIS2_FAILURE); rp_signed_encrypted_parts_increment_ref(encrypted_parts, env); secpolicy->encrypted_parts = encrypted_parts; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_signed_encrypted_parts_t *AXIS2_CALL rp_secpolicy_get_encrypted_parts( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->encrypted_parts; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_signed_elements( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_signed_encrypted_elements_t * signed_elements) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, signed_elements, AXIS2_FAILURE); rp_signed_encrypted_elements_increment_ref(signed_elements, env); secpolicy->signed_elements = signed_elements; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_signed_encrypted_elements_t *AXIS2_CALL rp_secpolicy_get_signed_elements( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->signed_elements; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_encrypted_elements( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_signed_encrypted_elements_t * encrypted_elements) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, encrypted_elements, AXIS2_FAILURE); rp_signed_encrypted_elements_increment_ref(encrypted_elements, env); secpolicy->encrypted_elements = encrypted_elements; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_signed_encrypted_elements_t *AXIS2_CALL rp_secpolicy_get_encrypted_elements( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->encrypted_elements; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_signed_items( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_signed_encrypted_items_t * signed_items) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, signed_items, AXIS2_FAILURE); secpolicy->signed_items = signed_items; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_signed_encrypted_items_t *AXIS2_CALL rp_secpolicy_get_signed_items( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->signed_items; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_encrypted_items( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_signed_encrypted_items_t * encrypted_items) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, encrypted_items, AXIS2_FAILURE); secpolicy->encrypted_items = encrypted_items; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_signed_encrypted_items_t *AXIS2_CALL rp_secpolicy_get_encrypted_items( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->encrypted_items; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_wss( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_property_t * wss) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, wss, AXIS2_FAILURE); rp_property_increment_ref(wss, env); secpolicy->wss = wss; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_property_t *AXIS2_CALL rp_secpolicy_get_wss( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->wss; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_trust10( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_trust10_t * trust10) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, trust10, AXIS2_FAILURE); rp_trust10_increment_ref(trust10, env); secpolicy->trust10 = trust10; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_trust10_t *AXIS2_CALL rp_secpolicy_get_trust10( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->trust10; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_secpolicy_set_rampart_config( rp_secpolicy_t * secpolicy, const axutil_env_t * env, rp_rampart_config_t * rampart_config) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, rampart_config, AXIS2_FAILURE); rp_rampart_config_increment_ref(rampart_config, env); secpolicy->rampart_config = rampart_config; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_rampart_config_t *AXIS2_CALL rp_secpolicy_get_rampart_config( rp_secpolicy_t * secpolicy, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return secpolicy->rampart_config; }