blob: b61aab826506b1eba546cf99372fe02148f5fb98 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <axis2_util.h>
#include <axis2_defines.h>
#include <axutil_utils_defines.h>
#include <axutil_env.h>
#include <axiom_node.h>
#include <oxs_x509_cert.h>
#include <rampart_context.h>
/**
* @file rampart_token_processor.h
* @brief Token processing of rampart
*/
/**
* @defgroup Token Processor
* @ingroup rampart_utils
* @{
*/
#ifndef RAMPART_TOKEN_PROCESSOR_H
#define RAMPART_TOKEN_PROCESSOR_H
#ifdef __cplusplus
extern "C" {
#endif
/**
* Extract certificate/session_key related information using given key_info node and scope node
* This will extract either certificate(asymmetric signing) or session_key (symmetric signing)
* @param env Environment structure
* @param key_info_node key info node.
* @param sec_node security header node
* @param rampart_context rampart context where key details could be found.
* @param msg_ctx message context
* @param is_signature boolean denoting whether the key_info is for signature
* @param cert where the certificate extracted (if any) should be populated
* @param key where the session key extracted (if any) should be populated
* @param token_type where the token type should be populated
* @param reference_method where the token reference method should be populated
* @return status of the operation
*/
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rampart_token_process_key_info(
const axutil_env_t *env,
axiom_node_t *key_info_node,
axiom_node_t *sec_node,
rampart_context_t* rampart_context,
axis2_msg_ctx_t *msg_ctx,
axis2_bool_t is_signature,
oxs_x509_cert_t **cert,
oxs_key_t **key,
axis2_char_t **token_type,
axis2_char_t **reference_method);
#if 0 /* These methods are not used will be removed from next release*/
/**
* extract certificate related information using given token_reference node and scope node
* @param env Environment structure
* @param st_ref_node security token reference node.
* @param scope_node node where additional details should be found. Can be NULL for all other
* scenarios but the Direct Reference
* @param cert certificate where values extracted should be populated
* @return status of the operation
*/
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rampart_token_process_security_token_reference(
const axutil_env_t *env,
axiom_node_t *st_ref_node,
axiom_node_t *scope_node,
oxs_x509_cert_t *cert);
/**
* extract certificate using reference id given in reference node
* @param env Environment structure
* @param ref_node security token reference node.
* @param scope_node node where certificate details should be found using reference id
* @param cert certificate where values extracted should be populated
* @return status of the operation
*/
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rampart_token_process_direct_ref(
const axutil_env_t *env,
axiom_node_t *ref_node,
axiom_node_t *scope_node,
oxs_x509_cert_t *cert);
/**
* extract embedded certificate from given embed_node
* @param env Environment structure
* @param embed_node node where certificate is embedded.
* @param cert certificate where values extracted should be populated
* @return status of the operation
*/
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rampart_token_process_embedded(
const axutil_env_t *env,
axiom_node_t *embed_node,
oxs_x509_cert_t *cert);
/**
* extract key identifier and populate the certificate
* @param env Environment structure
* @param ki_node node where key identifier is available.
* @param cert certificate where values extracted should be populated
* @return status of the operation
*/
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rampart_token_process_key_identifier(
const axutil_env_t *env,
axiom_node_t *ki_node,
oxs_x509_cert_t *cert);
/**
* extract key details from x509data node
* @param env Environment structure
* @param x509_data_node x509data node.
* @param cert certificate where values extracted should be populated
* @return status of the operation
*/
AXIS2_EXTERN axis2_status_t AXIS2_CALL
rampart_token_process_x509_data(
const axutil_env_t *env,
axiom_node_t *x509_data_node,
oxs_x509_cert_t *cert);
#endif
/* @} */
#ifdef __cplusplus
}
#endif
#endif /* !RAMPART_TOKEN_PROCESSOR_H */