blob: b1ea2f987712e73538aa502ae1bea79321fdc7ed [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <rp_supporting_tokens.h>
struct rp_supporting_tokens_t
{
rp_algorithmsuite_t *algorithmsuite;
axutil_array_list_t *tokens;
rp_signed_encrypted_elements_t *signed_elements;
rp_signed_encrypted_parts_t *signed_parts;
rp_signed_encrypted_elements_t *encrypted_elements;
rp_signed_encrypted_parts_t *encrypted_parts;
int type;
int ref;
};
AXIS2_EXTERN rp_supporting_tokens_t *AXIS2_CALL
rp_supporting_tokens_create(
const axutil_env_t * env)
{
rp_supporting_tokens_t *supporting_tokens = NULL;
AXIS2_ENV_CHECK(env, NULL);
supporting_tokens = (rp_supporting_tokens_t *) AXIS2_MALLOC(env->allocator,
sizeof
(rp_supporting_tokens_t));
if (supporting_tokens == NULL)
{
AXIS2_ERROR_SET(env->error, AXIS2_ERROR_NO_MEMORY, AXIS2_FAILURE);
return NULL;
}
supporting_tokens->tokens = NULL;
supporting_tokens->tokens = axutil_array_list_create(env, 0);
if (!(supporting_tokens->tokens))
{
rp_supporting_tokens_free(supporting_tokens, env);
AXIS2_ERROR_SET(env->error, AXIS2_ERROR_NO_MEMORY, AXIS2_FAILURE);
return NULL;
}
supporting_tokens->algorithmsuite = NULL;
supporting_tokens->signed_parts = NULL;
supporting_tokens->signed_elements = NULL;
supporting_tokens->encrypted_parts = NULL;
supporting_tokens->encrypted_elements = NULL;
supporting_tokens->type = 0;
supporting_tokens->ref = 0;
return supporting_tokens;
}
AXIS2_EXTERN void AXIS2_CALL
rp_supporting_tokens_free(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
if (supporting_tokens)
{
if (--(supporting_tokens->ref) > 0)
{
return;
}
if (supporting_tokens->tokens)
{
int i = 0;
for (i = 0; i < axutil_array_list_size(supporting_tokens->tokens,
env); i++)
{
rp_property_t *token = NULL;
token = (rp_property_t *)
axutil_array_list_get(supporting_tokens->tokens, env, i);
if (token)
rp_property_free(token, env);
token = NULL;
}
axutil_array_list_free(supporting_tokens->tokens, env);
supporting_tokens->tokens = NULL;
}
if (supporting_tokens->algorithmsuite)
{
rp_algorithmsuite_free(supporting_tokens->algorithmsuite, env);
supporting_tokens->algorithmsuite = NULL;
}
if (supporting_tokens->signed_parts)
{
rp_signed_encrypted_parts_free(supporting_tokens->signed_parts,
env);
supporting_tokens->signed_parts = NULL;
}
if (supporting_tokens->signed_elements)
{
rp_signed_encrypted_elements_free(supporting_tokens->
signed_elements, env);
supporting_tokens->signed_elements = NULL;
}
if (supporting_tokens->encrypted_parts)
{
rp_signed_encrypted_parts_free(supporting_tokens->encrypted_parts,
env);
supporting_tokens->encrypted_parts = NULL;
}
if (supporting_tokens->encrypted_elements)
{
rp_signed_encrypted_elements_free(supporting_tokens->
encrypted_elements, env);
supporting_tokens->encrypted_elements = NULL;
}
AXIS2_FREE(env->allocator, supporting_tokens);
supporting_tokens = NULL;
}
return;
}
/* Implementations */
AXIS2_EXTERN axutil_array_list_t *AXIS2_CALL
rp_supporting_tokens_get_tokens(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
return supporting_tokens->tokens;
}
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_supporting_tokens_add_token(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env,
rp_property_t * token)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
AXIS2_PARAM_CHECK(env->error, token, AXIS2_FAILURE);
rp_property_increment_ref(token, env);
axutil_array_list_add(supporting_tokens->tokens, env, token);
return AXIS2_SUCCESS;
}
AXIS2_EXTERN rp_algorithmsuite_t *AXIS2_CALL
rp_supporting_tokens_get_algorithmsuite(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env)
{
AXIS2_ENV_CHECK(env, NULL);
return supporting_tokens->algorithmsuite;
}
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_supporting_tokens_set_algorithmsuite(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env,
rp_algorithmsuite_t * algorithmsuite)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
AXIS2_PARAM_CHECK(env->error, algorithmsuite, AXIS2_FAILURE);
rp_algorithmsuite_increment_ref(algorithmsuite, env);
supporting_tokens->algorithmsuite = algorithmsuite;
return AXIS2_SUCCESS;
}
AXIS2_EXTERN rp_signed_encrypted_parts_t *AXIS2_CALL
rp_supporting_tokens_get_signed_parts(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env)
{
AXIS2_ENV_CHECK(env, NULL);
return supporting_tokens->signed_parts;
}
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_supporting_tokens_set_signed_parts(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env,
rp_signed_encrypted_parts_t * signed_parts)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
AXIS2_PARAM_CHECK(env->error, signed_parts, AXIS2_FAILURE);
supporting_tokens->signed_parts = signed_parts;
return AXIS2_SUCCESS;
}
AXIS2_EXTERN rp_signed_encrypted_elements_t *AXIS2_CALL
rp_supporting_tokens_get_signed_elements(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env)
{
AXIS2_ENV_CHECK(env, NULL);
return supporting_tokens->signed_elements;
}
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_supporting_tokens_set_signed_elements(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env,
rp_signed_encrypted_elements_t * signed_elements)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
AXIS2_PARAM_CHECK(env->error, signed_elements, AXIS2_FAILURE);
supporting_tokens->signed_elements = signed_elements;
return AXIS2_SUCCESS;
}
AXIS2_EXTERN rp_signed_encrypted_parts_t *AXIS2_CALL
rp_supporting_tokens_get_encrypted_parts(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env)
{
AXIS2_ENV_CHECK(env, NULL);
return supporting_tokens->encrypted_parts;
}
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_supporting_tokens_set_encrypted_parts(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env,
rp_signed_encrypted_parts_t * encrypted_parts)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
AXIS2_PARAM_CHECK(env->error, encrypted_parts, AXIS2_FAILURE);
supporting_tokens->encrypted_parts = encrypted_parts;
return AXIS2_SUCCESS;
}
AXIS2_EXTERN rp_signed_encrypted_elements_t *AXIS2_CALL
rp_supporting_tokens_get_encrypted_elements(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
return supporting_tokens->encrypted_elements;
}
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_supporting_tokens_set_encrypted_elements(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env,
rp_signed_encrypted_elements_t * encrypted_elements)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
AXIS2_PARAM_CHECK(env->error, encrypted_elements, AXIS2_FAILURE);
supporting_tokens->encrypted_elements = encrypted_elements;
return AXIS2_SUCCESS;
}
AXIS2_EXTERN int AXIS2_CALL
rp_supporting_tokens_get_type(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
return supporting_tokens->type;
}
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_supporting_tokens_set_type(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env,
int type)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
supporting_tokens->type = type;
return AXIS2_SUCCESS;
}
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rp_supporting_tokens_increment_ref(
rp_supporting_tokens_t * supporting_tokens,
const axutil_env_t * env)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
supporting_tokens->ref++;
return AXIS2_SUCCESS;
}