AXIS2_EXTERN neethi_assertion_t *AXIS2_CALL rp_transport_token_builder_build( const axutil_env_t * env, axiom_node_t * node, axiom_element_t * element) { rp_property_t *transport_token = NULL; neethi_policy_t *policy = NULL; axiom_node_t *child_node = NULL; axiom_element_t *child_element = NULL; axutil_array_list_t *alternatives = NULL; neethi_operator_t *component = NULL; neethi_all_t *all = NULL; neethi_assertion_t *assertion = NULL; neethi_policy_t *normalized_policy = NULL; (void)element; transport_token = rp_property_create(env); child_node = axiom_node_get_first_element(node, env); if(!child_node) { return NULL; } if(axiom_node_get_node_type(child_node, env) == AXIOM_ELEMENT) { child_element = (axiom_element_t *)axiom_node_get_data_element(child_node, env); if(child_element) { policy = neethi_engine_get_policy(env, child_node, child_element); if(!policy) { return NULL; } normalized_policy = neethi_engine_get_normalize(env, AXIS2_FALSE, policy); policy = NULL; alternatives = neethi_policy_get_alternatives(normalized_policy, env); component = (neethi_operator_t *)axutil_array_list_get(alternatives, env, 0); all = (neethi_all_t *)neethi_operator_get_value(component, env); transport_token_process_alternatives(env, all, transport_token); assertion = neethi_assertion_create_with_args(env, (AXIS2_FREE_VOID_ARG)rp_property_free, transport_token, ASSERTION_TYPE_TRANSPORT_TOKEN); neethi_policy_free(normalized_policy, env); normalized_policy = NULL; return assertion; } else return NULL; } else return NULL; }
axis2_status_t AXIS2_CALL secpolicy_process_alternatives( const axutil_env_t *env, neethi_all_t *all, rp_secpolicy_t *secpolicy) { neethi_operator_t *operator = NULL; axutil_array_list_t *arraylist = NULL; neethi_assertion_t *assertion = NULL; neethi_assertion_type_t type; void *value = NULL; int i = 0; arraylist = neethi_all_get_policy_components(all, env); for (i = 0; i < axutil_array_list_size(arraylist, env); i++) { operator =(neethi_operator_t *) axutil_array_list_get(arraylist, env, i); assertion = (neethi_assertion_t *) neethi_operator_get_value(operator, env); value = neethi_assertion_get_value(assertion, env); type = neethi_assertion_get_type(assertion, env); if (value) { if (type == ASSERTION_TYPE_TRANSPORT_BINDING) { rp_property_t *binding = NULL; rp_transport_binding_t *transport_binding = NULL; transport_binding = (rp_transport_binding_t *) neethi_assertion_get_value(assertion, env); if (!transport_binding) { return AXIS2_FAILURE; } binding = rp_property_create(env); rp_property_set_value(binding, env, transport_binding, RP_PROPERTY_TRANSPORT_BINDING); rp_secpolicy_set_binding(secpolicy, env, binding); } else if (type == ASSERTION_TYPE_ASSYMMETRIC_BINDING) { rp_property_t *binding = NULL; rp_asymmetric_binding_t *asymmetric_binding = NULL; asymmetric_binding = (rp_asymmetric_binding_t *) neethi_assertion_get_value(assertion, env); if (!asymmetric_binding) { return AXIS2_FAILURE; } binding = rp_property_create(env); rp_property_set_value(binding, env, asymmetric_binding, RP_PROPERTY_ASYMMETRIC_BINDING); rp_secpolicy_set_binding(secpolicy, env, binding); } else if (type == ASSERTION_TYPE_SYMMETRIC_BINDING) { rp_property_t *binding = NULL; rp_symmetric_binding_t *symmetric_binding = NULL; symmetric_binding = (rp_symmetric_binding_t *) neethi_assertion_get_value(assertion, env); if (!symmetric_binding) { return AXIS2_FAILURE; } binding = rp_property_create(env); rp_property_set_value(binding, env, symmetric_binding, RP_PROPERTY_SYMMETRIC_BINDING); rp_secpolicy_set_binding(secpolicy, env, binding); } else if (type == ASSERTION_TYPE_SUPPORTING_TOKENS) { rp_supporting_tokens_t *supporting_tokens = NULL; supporting_tokens = (rp_supporting_tokens_t *) neethi_assertion_get_value(assertion, env); if (supporting_tokens) { rp_property_type_t type; type = rp_supporting_tokens_get_type(supporting_tokens, env); if (type == RP_PROPERTY_SIGNED_SUPPORTING_TOKEN) { rp_secpolicy_set_signed_supporting_tokens(secpolicy, env, supporting_tokens); } else if (type == RP_PROPERTY_SIGNED_ENDORSING_SUPPORTING_TOKEN) { rp_secpolicy_set_signed_endorsing_supporting_tokens(secpolicy, env, supporting_tokens); } else if (type == RP_PROPERTY_SUPPORTING_SUPPORTING_TOKEN) { rp_secpolicy_set_supporting_tokens(secpolicy, env, supporting_tokens); } else if (type == RP_PROPERTY_ENDORSING_SUPPORTING_TOKEN) { rp_secpolicy_set_endorsing_supporting_tokens(secpolicy, env, supporting_tokens); } else return AXIS2_FAILURE; } else return AXIS2_FAILURE; } else if (type == ASSERTION_TYPE_WSS10) { rp_wss10_t *wss10 = NULL; rp_property_t *wss = NULL; wss10 = (rp_wss10_t *) neethi_assertion_get_value(assertion, env); if (!wss10) { return AXIS2_FAILURE; } wss = rp_property_create(env); rp_property_set_value(wss, env, wss10, RP_PROPERTY_WSS10); rp_secpolicy_set_wss(secpolicy, env, wss); } else if (type == ASSERTION_TYPE_WSS11) { rp_wss11_t *wss11 = NULL; rp_property_t *wss = NULL; wss11 = (rp_wss11_t *) neethi_assertion_get_value(assertion, env); if (!wss11) { return AXIS2_FAILURE; } wss = rp_property_create(env); rp_property_set_value(wss, env, wss11, RP_PROPERTY_WSS11); rp_secpolicy_set_wss(secpolicy, env, wss); } else if (type == ASSERTION_TYPE_TRUST10) { rp_trust10_t *trust10 = NULL; trust10 = (rp_trust10_t *) neethi_assertion_get_value(assertion, env); if (!trust10) { return AXIS2_FAILURE; } rp_secpolicy_set_trust10(secpolicy, env, trust10); } else if (type == ASSERTION_TYPE_SIGNED_ENCRYPTED_PARTS) { rp_signed_encrypted_parts_t *signed_encrypted_parts = NULL; signed_encrypted_parts = (rp_signed_encrypted_parts_t *) neethi_assertion_get_value(assertion, env); if (signed_encrypted_parts) { if (rp_signed_encrypted_parts_get_signedparts (signed_encrypted_parts, env)) { rp_secpolicy_set_signed_parts(secpolicy, env, signed_encrypted_parts); } else { rp_secpolicy_set_encrypted_parts(secpolicy, env, signed_encrypted_parts); } } else return AXIS2_FAILURE; } else if (type == ASSERTION_TYPE_RAMPART_CONFIG) { rp_rampart_config_t *rampart_config = NULL; rampart_config = (rp_rampart_config_t *) neethi_assertion_get_value(assertion, env); if (!rampart_config) { return AXIS2_FAILURE; } rp_secpolicy_set_rampart_config(secpolicy, env, rampart_config); } else { continue; } } else return AXIS2_FAILURE; } return AXIS2_SUCCESS; }