/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include struct rp_supporting_tokens_t { rp_algorithmsuite_t *algorithmsuite; axutil_array_list_t *tokens; rp_signed_encrypted_elements_t *signed_elements; rp_signed_encrypted_parts_t *signed_parts; rp_signed_encrypted_elements_t *encrypted_elements; rp_signed_encrypted_parts_t *encrypted_parts; int type; int ref; }; AXIS2_EXTERN rp_supporting_tokens_t *AXIS2_CALL rp_supporting_tokens_create( const axutil_env_t * env) { rp_supporting_tokens_t *supporting_tokens = NULL; AXIS2_ENV_CHECK(env, NULL); supporting_tokens = (rp_supporting_tokens_t *)AXIS2_MALLOC(env->allocator, sizeof(rp_supporting_tokens_t)); if(supporting_tokens == NULL) { AXIS2_ERROR_SET(env->error, AXIS2_ERROR_NO_MEMORY, AXIS2_FAILURE); return NULL; } supporting_tokens->tokens = NULL; supporting_tokens->tokens = axutil_array_list_create(env, 0); if(!(supporting_tokens->tokens)) { rp_supporting_tokens_free(supporting_tokens, env); AXIS2_ERROR_SET(env->error, AXIS2_ERROR_NO_MEMORY, AXIS2_FAILURE); return NULL; } supporting_tokens->algorithmsuite = NULL; supporting_tokens->signed_parts = NULL; supporting_tokens->signed_elements = NULL; supporting_tokens->encrypted_parts = NULL; supporting_tokens->encrypted_elements = NULL; supporting_tokens->type = 0; supporting_tokens->ref = 0; return supporting_tokens; } AXIS2_EXTERN void AXIS2_CALL rp_supporting_tokens_free( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); if(supporting_tokens) { if(--(supporting_tokens->ref) > 0) { return; } if(supporting_tokens->tokens) { int i = 0; for(i = 0; i < axutil_array_list_size(supporting_tokens->tokens, env); i++) { rp_property_t *token = NULL; token = (rp_property_t *)axutil_array_list_get(supporting_tokens->tokens, env, i); if(token) rp_property_free(token, env); token = NULL; } axutil_array_list_free(supporting_tokens->tokens, env); supporting_tokens->tokens = NULL; } if(supporting_tokens->algorithmsuite) { rp_algorithmsuite_free(supporting_tokens->algorithmsuite, env); supporting_tokens->algorithmsuite = NULL; } if(supporting_tokens->signed_parts) { rp_signed_encrypted_parts_free(supporting_tokens->signed_parts, env); supporting_tokens->signed_parts = NULL; } if(supporting_tokens->signed_elements) { rp_signed_encrypted_elements_free(supporting_tokens-> signed_elements, env); supporting_tokens->signed_elements = NULL; } if(supporting_tokens->encrypted_parts) { rp_signed_encrypted_parts_free(supporting_tokens->encrypted_parts, env); supporting_tokens->encrypted_parts = NULL; } if(supporting_tokens->encrypted_elements) { rp_signed_encrypted_elements_free(supporting_tokens-> encrypted_elements, env); supporting_tokens->encrypted_elements = NULL; } AXIS2_FREE(env->allocator, supporting_tokens); supporting_tokens = NULL; } return; } /* Implementations */ AXIS2_EXTERN axutil_array_list_t *AXIS2_CALL rp_supporting_tokens_get_tokens( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return supporting_tokens->tokens; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_supporting_tokens_add_token( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env, rp_property_t * token) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, token, AXIS2_FAILURE); rp_property_increment_ref(token, env); axutil_array_list_add(supporting_tokens->tokens, env, token); return AXIS2_SUCCESS; } AXIS2_EXTERN rp_algorithmsuite_t *AXIS2_CALL rp_supporting_tokens_get_algorithmsuite( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, NULL); return supporting_tokens->algorithmsuite; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_supporting_tokens_set_algorithmsuite( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env, rp_algorithmsuite_t * algorithmsuite) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, algorithmsuite, AXIS2_FAILURE); rp_algorithmsuite_increment_ref(algorithmsuite, env); supporting_tokens->algorithmsuite = algorithmsuite; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_signed_encrypted_parts_t *AXIS2_CALL rp_supporting_tokens_get_signed_parts( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, NULL); return supporting_tokens->signed_parts; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_supporting_tokens_set_signed_parts( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env, rp_signed_encrypted_parts_t * signed_parts) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, signed_parts, AXIS2_FAILURE); supporting_tokens->signed_parts = signed_parts; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_signed_encrypted_elements_t *AXIS2_CALL rp_supporting_tokens_get_signed_elements( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, NULL); return supporting_tokens->signed_elements; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_supporting_tokens_set_signed_elements( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env, rp_signed_encrypted_elements_t * signed_elements) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, signed_elements, AXIS2_FAILURE); supporting_tokens->signed_elements = signed_elements; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_signed_encrypted_parts_t *AXIS2_CALL rp_supporting_tokens_get_encrypted_parts( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, NULL); return supporting_tokens->encrypted_parts; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_supporting_tokens_set_encrypted_parts( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env, rp_signed_encrypted_parts_t * encrypted_parts) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, encrypted_parts, AXIS2_FAILURE); supporting_tokens->encrypted_parts = encrypted_parts; return AXIS2_SUCCESS; } AXIS2_EXTERN rp_signed_encrypted_elements_t *AXIS2_CALL rp_supporting_tokens_get_encrypted_elements( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return supporting_tokens->encrypted_elements; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_supporting_tokens_set_encrypted_elements( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env, rp_signed_encrypted_elements_t * encrypted_elements) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); AXIS2_PARAM_CHECK(env->error, encrypted_elements, AXIS2_FAILURE); supporting_tokens->encrypted_elements = encrypted_elements; return AXIS2_SUCCESS; } AXIS2_EXTERN int AXIS2_CALL rp_supporting_tokens_get_type( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); return supporting_tokens->type; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_supporting_tokens_set_type( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env, int type) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); supporting_tokens->type = type; return AXIS2_SUCCESS; } AXIS2_EXTERN axis2_status_t AXIS2_CALL rp_supporting_tokens_increment_ref( rp_supporting_tokens_t * supporting_tokens, const axutil_env_t * env) { AXIS2_ENV_CHECK(env, AXIS2_FAILURE); supporting_tokens->ref++; return AXIS2_SUCCESS; }