/*
 * Licensed to the Apache Software Foundation (ASF) under one or more
 * contributor license agreements.  See the NOTICE file distributed with
 * this work for additional information regarding copyright ownership.
 * The ASF licenses this file to You under the Apache License, Version 2.0
 * (the "License"); you may not use this file except in compliance with
 * the License.  You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

#include <rp_security_context_token.h>

struct rp_security_context_token_t
{
    rp_token_t *token;
    axis2_bool_t require_external_uri_ref;
    axis2_bool_t sc10_security_context_token;
    neethi_policy_t *bootstrap_policy;
    axis2_bool_t is_secure_conversation_token;
    int ref;
};

AXIS2_EXTERN rp_security_context_token_t *AXIS2_CALL
rp_security_context_token_create(
    const axutil_env_t * env)
{
    rp_security_context_token_t *security_context_token = NULL;

    security_context_token = (rp_security_context_token_t *)AXIS2_MALLOC(env->allocator,
        sizeof(rp_security_context_token_t));

    if(!security_context_token)
    {
        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
            "[neethi] Security context token assertion creation failed. Insufficient memory");
        AXIS2_ERROR_SET(env->error, AXIS2_ERROR_NO_MEMORY, AXIS2_FAILURE);
        return NULL;
    }

    security_context_token->ref = 0;
    security_context_token->require_external_uri_ref = AXIS2_FALSE;
    security_context_token->sc10_security_context_token = AXIS2_FALSE;
    security_context_token->bootstrap_policy = NULL;
    security_context_token->is_secure_conversation_token = AXIS2_FALSE;

    security_context_token->token = rp_token_create(env);
    if(!security_context_token->token)
    {
        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
            "[neethi] Security context token assertion creation failed.");
        AXIS2_ERROR_SET(env->error, AXIS2_ERROR_NO_MEMORY, AXIS2_FAILURE);
        rp_security_context_token_free(security_context_token, env);
        return NULL;
    }

    return security_context_token;
}

AXIS2_EXTERN void AXIS2_CALL
rp_security_context_token_free(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env)
{
    if(security_context_token)
    {
        if(--(security_context_token->ref) > 0)
        {
            return;
        }

        if(security_context_token->bootstrap_policy)
        {
            neethi_policy_free(security_context_token->bootstrap_policy, env);
        }

        rp_token_free(security_context_token->token, env);
        AXIS2_FREE(env->allocator, security_context_token);
        security_context_token = NULL;
    }
}

/* Implementations */

AXIS2_EXTERN axis2_char_t *AXIS2_CALL
rp_security_context_token_get_inclusion(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env)
{
    return rp_token_get_inclusion(security_context_token->token, env);
}

AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_security_context_token_set_inclusion(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env,
    axis2_char_t * inclusion)
{
    return rp_token_set_inclusion(security_context_token->token, env, inclusion);
}

AXIS2_EXTERN derive_key_type_t AXIS2_CALL
rp_security_context_token_get_derivedkey(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env)
{
    return rp_token_get_derivedkey_type(security_context_token->token, env);
}

AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_security_context_token_set_derivedkey(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env,
    derive_key_type_t derivedkey)
{
    return rp_token_set_derivedkey_type(security_context_token->token, env, derivedkey);
}

AXIS2_EXTERN derive_key_version_t AXIS2_CALL
rp_security_context_token_get_derivedkey_version(
    rp_security_context_token_t *security_context_token,
    const axutil_env_t *env)
{
    return rp_token_get_derive_key_version(security_context_token->token, env);
}

AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_security_context_token_set_derivedkey_version(
    rp_security_context_token_t *security_context_token,
    const axutil_env_t *env,
    derive_key_version_t version)
{
    return rp_token_set_derive_key_version(security_context_token->token, env, version);
}

AXIS2_EXTERN axis2_bool_t AXIS2_CALL
rp_security_context_token_get_require_external_uri_ref(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env)
{
    return security_context_token->require_external_uri_ref;
}

AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_security_context_token_set_require_external_uri_ref(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env,
    axis2_bool_t require_external_uri_ref)
{
    security_context_token->require_external_uri_ref = require_external_uri_ref;
    return AXIS2_SUCCESS;
}

AXIS2_EXTERN axis2_bool_t AXIS2_CALL
rp_security_context_token_get_sc10_security_context_token(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env)
{
    return security_context_token->sc10_security_context_token;
}

AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_security_context_token_set_sc10_security_context_token(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env,
    axis2_bool_t sc10_security_context_token)
{
    security_context_token->sc10_security_context_token = sc10_security_context_token;
    return AXIS2_SUCCESS;
}

AXIS2_EXTERN axis2_char_t *AXIS2_CALL
rp_security_context_token_get_issuer(
    rp_security_context_token_t *security_context_token,
    const axutil_env_t *env)
{
    return rp_token_get_issuer(security_context_token->token, env);
}

AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_security_context_token_set_issuer(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env,
    axis2_char_t *issuer)
{
    return rp_token_set_issuer(security_context_token->token, env, issuer);
}

AXIS2_EXTERN neethi_policy_t *AXIS2_CALL
rp_security_context_token_get_bootstrap_policy(
    rp_security_context_token_t *security_context_token,
    const axutil_env_t *env)
{
    return security_context_token->bootstrap_policy;
}

AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_security_context_token_set_bootstrap_policy(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env,
    neethi_policy_t *bootstrap_policy)
{
    security_context_token->bootstrap_policy = bootstrap_policy;
    return AXIS2_SUCCESS;
}

AXIS2_EXTERN axis2_bool_t AXIS2_CALL
rp_security_context_token_get_is_secure_conversation_token(
    rp_security_context_token_t *security_context_token,
    const axutil_env_t *env)
{
    return security_context_token->is_secure_conversation_token;
}

AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_security_context_token_set_is_secure_conversation_token(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env,
    axis2_bool_t is_secure_conversation_token)
{
    security_context_token->is_secure_conversation_token = is_secure_conversation_token;
    return AXIS2_SUCCESS;
}

AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_security_context_token_increment_ref(
    rp_security_context_token_t * security_context_token,
    const axutil_env_t * env)
{
    AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
    security_context_token->ref++;
    return AXIS2_SUCCESS;
}