include/rampart_token_processor.h (57 lines of code) (raw):

/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include <axis2_util.h> #include <axis2_defines.h> #include <axutil_utils_defines.h> #include <axutil_env.h> #include <axiom_node.h> #include <oxs_x509_cert.h> #include <rampart_context.h> /** * @file rampart_token_processor.h * @brief Token processing of rampart */ /** * @defgroup Token Processor * @ingroup rampart_utils * @{ */ #ifndef RAMPART_TOKEN_PROCESSOR_H #define RAMPART_TOKEN_PROCESSOR_H #ifdef __cplusplus extern "C" { #endif /** * Extract certificate/session_key related information using given key_info node and scope node * This will extract either certificate(asymmetric signing) or session_key (symmetric signing) * @param env Environment structure * @param key_info_node key info node. * @param sec_node security header node * @param rampart_context rampart context where key details could be found. * @param msg_ctx message context * @param is_signature boolean denoting whether the key_info is for signature * @param cert where the certificate extracted (if any) should be populated * @param key where the session key extracted (if any) should be populated * @param token_type where the token type should be populated * @param reference_method where the token reference method should be populated * @return status of the operation */ AXIS2_EXTERN axis2_status_t AXIS2_CALL rampart_token_process_key_info( const axutil_env_t *env, axiom_node_t *key_info_node, axiom_node_t *sec_node, rampart_context_t* rampart_context, axis2_msg_ctx_t *msg_ctx, axis2_bool_t is_signature, oxs_x509_cert_t **cert, oxs_key_t **key, axis2_char_t **token_type, axis2_char_t **reference_method); #if 0 /* These methods are not used will be removed from next release*/ /** * extract certificate related information using given token_reference node and scope node * @param env Environment structure * @param st_ref_node security token reference node. * @param scope_node node where additional details should be found. Can be NULL for all other * scenarios but the Direct Reference * @param cert certificate where values extracted should be populated * @return status of the operation */ AXIS2_EXTERN axis2_status_t AXIS2_CALL rampart_token_process_security_token_reference( const axutil_env_t *env, axiom_node_t *st_ref_node, axiom_node_t *scope_node, oxs_x509_cert_t *cert); /** * extract certificate using reference id given in reference node * @param env Environment structure * @param ref_node security token reference node. * @param scope_node node where certificate details should be found using reference id * @param cert certificate where values extracted should be populated * @return status of the operation */ AXIS2_EXTERN axis2_status_t AXIS2_CALL rampart_token_process_direct_ref( const axutil_env_t *env, axiom_node_t *ref_node, axiom_node_t *scope_node, oxs_x509_cert_t *cert); /** * extract embedded certificate from given embed_node * @param env Environment structure * @param embed_node node where certificate is embedded. * @param cert certificate where values extracted should be populated * @return status of the operation */ AXIS2_EXTERN axis2_status_t AXIS2_CALL rampart_token_process_embedded( const axutil_env_t *env, axiom_node_t *embed_node, oxs_x509_cert_t *cert); /** * extract key identifier and populate the certificate * @param env Environment structure * @param ki_node node where key identifier is available. * @param cert certificate where values extracted should be populated * @return status of the operation */ AXIS2_EXTERN axis2_status_t AXIS2_CALL rampart_token_process_key_identifier( const axutil_env_t *env, axiom_node_t *ki_node, oxs_x509_cert_t *cert); /** * extract key details from x509data node * @param env Environment structure * @param x509_data_node x509data node. * @param cert certificate where values extracted should be populated * @return status of the operation */ AXIS2_EXTERN axis2_status_t AXIS2_CALL rampart_token_process_x509_data( const axutil_env_t *env, axiom_node_t *x509_data_node, oxs_x509_cert_t *cert); #endif /* @} */ #ifdef __cplusplus } #endif #endif /* !RAMPART_TOKEN_PROCESSOR_H */