You are viewing a plain text version of this content. The canonical link for it is here.
Posted to rampart-dev@ws.apache.org by sh...@apache.org on 2008/08/14 10:02:05 UTC
svn commit: r685798 -
/webservices/rampart/trunk/c/src/rahas/rahas_request_processor.c
Author: shankar
Date: Thu Aug 14 01:02:04 2008
New Revision: 685798
URL: http://svn.apache.org/viewvc?rev=685798&view=rev
Log:
checking whether client entropy is needed. Fixed the related bug.
Modified:
webservices/rampart/trunk/c/src/rahas/rahas_request_processor.c
Modified: webservices/rampart/trunk/c/src/rahas/rahas_request_processor.c
URL: http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/rahas/rahas_request_processor.c?rev=685798&r1=685797&r2=685798&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/rahas/rahas_request_processor.c (original)
+++ webservices/rampart/trunk/c/src/rahas/rahas_request_processor.c Thu Aug 14 01:02:04 2008
@@ -93,15 +93,6 @@
axis2_bool_t server_entropy_needed = AXIS2_FALSE;
int key_size = TRUST_DEFAULT_KEY_SIZE;
- /* validate whether given parameters are ok to proceed */
- if(rahas_validate_issue_request_parameters(env, rst, rstr, msg_ctx, trust_version,
- client_entropy_needed, &requester_entropy) != AXIS2_SUCCESS)
- {
- AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
- "[rahas]Cannot issue SecurityContextToken because parameter validation failed.");
- return AXIS2_FAILURE;
- }
-
/* check whether client entropy and server entropy are needed */
if (rahas_get_sts_policy_parameters(
env, msg_ctx, &client_entropy_needed, &server_entropy_needed) != AXIS2_SUCCESS)
@@ -112,6 +103,14 @@
return AXIS2_FAILURE;
}
+ /* validate whether given parameters are ok to proceed */
+ if(rahas_validate_issue_request_parameters(env, rst, rstr, msg_ctx, trust_version,
+ client_entropy_needed, &requester_entropy) != AXIS2_SUCCESS)
+ {
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
+ "[rahas]Cannot issue SecurityContextToken because parameter validation failed.");
+ return AXIS2_FAILURE;
+ }
/* Get the size of the key*/
key_size = trust_rst_get_key_size(rst, env);