You are viewing a plain text version of this content. The canonical link for it is here.
Posted to java-dev@axis.apache.org by ka...@apache.org on 2007/03/20 07:18:40 UTC

svn commit: r520295 - in /webservices/axis2/trunk/c/rampart: src/util/rampart_sec_header_processor.c test/openssl/sign/test.c

Author: kaushalye
Date: Mon Mar 19 23:18:39 2007
New Revision: 520295

URL: http://svn.apache.org/viewvc?view=rev&rev=520295
Log:
Code improvement in Rampart

Modified:
    webservices/axis2/trunk/c/rampart/src/util/rampart_sec_header_processor.c
    webservices/axis2/trunk/c/rampart/test/openssl/sign/test.c

Modified: webservices/axis2/trunk/c/rampart/src/util/rampart_sec_header_processor.c
URL: http://svn.apache.org/viewvc/webservices/axis2/trunk/c/rampart/src/util/rampart_sec_header_processor.c?view=diff&rev=520295&r1=520294&r2=520295
==============================================================================
--- webservices/axis2/trunk/c/rampart/src/util/rampart_sec_header_processor.c (original)
+++ webservices/axis2/trunk/c/rampart/src/util/rampart_sec_header_processor.c Mon Mar 19 23:18:39 2007
@@ -700,135 +700,6 @@
     return status;
 }
 
-/*
-#ifdef PRE_CHECK    
-static axis2_status_t 
-rampart_shp_pre_security_check(const axis2_env_t *env,
-    axis2_msg_ctx_t *msg_ctx,
-    rampart_actions_t *actions,
-    axiom_soap_envelope_t *soap_envelope,
-    axiom_node_t *sec_node)
-{
-    axis2_char_t *items = NULL;
-    axis2_array_list_t *items_list = NULL;
-    int i = 0, size = 0;
-
-    AXIS2_LOG_INFO(env->log, "[rampart][shp] Enforcing Security");
-    items = RAMPART_ACTIONS_GET_ITEMS(actions, env);    
-    if (!items)
-    {
-        AXIS2_LOG_INFO(env->log, "[rampart][shp] No items defined. So nothing to do.");
-        return AXIS2_SUCCESS;
-    }
-
-  
-    items_list = axis2_tokenize(env, items, ' ');
-    size = axis2_array_list_size(items_list, env);
-
-  
-    for (i = 0; i < size; i++)
-    {
-        axis2_char_t *item = NULL;
-        item = axis2_array_list_get(items_list, env, i);    
-        
-        if (0 == axis2_strcmp(RAMPART_ACTION_ITEMS_USERNAMETOKEN, axis2_strtrim(env, item, NULL))){
-  
-            int num_of_ut = 0;
-            num_of_ut = oxs_axiom_get_number_of_children_with_qname(env, sec_node, 
-                        RAMPART_SECURITY_TIMESTAMP, RAMPART_WSU_XMLNS, RAMPART_WSSE); 
-            if(1 != num_of_ut){
-                AXIS2_LOG_INFO(env->log, "[rampart][shp] UsernameToken is required. But not available");
-                rampart_create_fault_envelope(env, RAMPART_FAULT_SECURITY_TOKEN_UNAVAILABLE, 
-                        "UsernameToken is not available", RAMPART_FAULT_IN_USERNAMETOKEN, msg_ctx);
-                return AXIS2_FAILURE;
-            }
-        }else if(0 == axis2_strcmp(RAMPART_ACTION_ITEMS_TIMESTAMP, axis2_strtrim(env, item, NULL))){
-        
-            int num_of_ts = 0;
-            num_of_ts = oxs_axiom_get_number_of_children_with_qname(env, sec_node,
-                        RAMPART_SECURITY_TIMESTAMP, RAMPART_WSU_XMLNS, RAMPART_WSSE);
-            if(1 != num_of_ts){
-                AXIS2_LOG_INFO(env->log, "[rampart][shp] Timestamp is required. But not available");
-                rampart_create_fault_envelope(env, RAMPART_FAULT_SECURITY_TOKEN_UNAVAILABLE, 
-                        "Timestamp is not available", RAMPART_FAULT_IN_TIMESTAMP, msg_ctx);
-                return AXIS2_FAILURE;
-            }
-
-        }
-
-    } 
-    return AXIS2_SUCCESS;
-}
-#endif
-*/
-/*Compare security checked results with action items*/
-/*
-static axis2_status_t
-rampart_shp_post_security_check(const axis2_env_t *env,
-    axis2_msg_ctx_t *msg_ctx,
-    rampart_actions_t *actions)
-{
-    axis2_char_t *items = NULL;
-    axis2_array_list_t *items_list = NULL;
-    int i = 0, size = 0;
-
-    AXIS2_LOG_INFO(env->log, "[rampart][shp] Enforcing Security");
-    items = RAMPART_ACTIONS_GET_ITEMS(actions, env);
-    if (!items)
-    {
-        AXIS2_LOG_INFO(env->log, "[rampart][shp] No items defined. So nothing to do.");
-        return AXIS2_SUCCESS;
-    }
-
-
-    items_list = axis2_tokenize(env, items, ' ');
-    size = axis2_array_list_size(items_list, env);
-
-
-    for (i = 0; i < size; i++)
-    {
-        axis2_char_t *item = NULL;
-        axis2_char_t *result = NULL;
-        item = axis2_array_list_get(items_list, env, i);
-
-        if (0 == axis2_strcmp(RAMPART_ACTION_ITEMS_USERNAMETOKEN, axis2_strtrim(env, item, NULL))){
-
-            result = (axis2_char_t*)rampart_get_security_processed_result(env, msg_ctx, RAMPART_SPR_UT_CHECKED);   
-            if(!result || (0 != axis2_strcmp(result, RAMPART_YES)) ){
-                AXIS2_LOG_INFO(env->log, "[rampart][shp] UsernameToken is required. But not available");
-                rampart_create_fault_envelope(env, RAMPART_FAULT_SECURITY_TOKEN_UNAVAILABLE,
-                        "UsernameToken is not available", RAMPART_FAULT_IN_USERNAMETOKEN, msg_ctx);
-                return AXIS2_FAILURE;
-            }
-            result = NULL;
-        }else if(0 == axis2_strcmp(RAMPART_ACTION_ITEMS_TIMESTAMP, axis2_strtrim(env, item, NULL))){
-
-            result = (axis2_char_t*)rampart_get_security_processed_result(env, msg_ctx, RAMPART_SPR_TS_CHECKED);
-            if(!result || (0 != axis2_strcmp(result, RAMPART_YES)) ){
-                AXIS2_LOG_INFO(env->log, "[rampart][shp] Timestamp is required. But not available");
-                rampart_create_fault_envelope(env, RAMPART_FAULT_SECURITY_TOKEN_UNAVAILABLE,
-                        "Timestamp is not available", RAMPART_FAULT_IN_TIMESTAMP, msg_ctx);
-                return AXIS2_FAILURE;
-            }
-            result = NULL;
-        }else if(0 == axis2_strcmp(RAMPART_ACTION_ITEMS_ENCRYPT, axis2_strtrim(env, item, NULL))){
-
-            result = (axis2_char_t*)rampart_get_security_processed_result(env, msg_ctx, RAMPART_SPR_ENC_CHECKED);
-            if(!result || (0 != axis2_strcmp(result, RAMPART_YES)) ){
-                AXIS2_LOG_INFO(env->log, "[rampart][shp] Encryption is required. But not available");
-                rampart_create_fault_envelope(env, RAMPART_FAULT_SECURITY_TOKEN_UNAVAILABLE,
-                        "Data are not encrypted", RAMPART_FAULT_IN_ENCRYPTED_KEY, msg_ctx);
-                return AXIS2_FAILURE;
-            }
-            result = NULL;
-        }else if (0 == axis2_strcmp(RAMPART_ACTION_ITEMS_SIGNATURE, axis2_strtrim(env, item, NULL))){
-
-        }
-
-    }
-    return AXIS2_SUCCESS;
-}
-*/
 
 /*Public functions*/
 
@@ -842,18 +713,6 @@
     axiom_node_t *cur_node = NULL;
     axis2_status_t status = AXIS2_FAILURE;
 
-    /*If certian security elements are expected by the reciever, rampart should check for those */
-    /*This should be removed once header encryption is introduced. But this pre-check avoids further processing of headers.*/
-/*    
-#ifdef PRE_CHECK    
-    status =  rampart_shp_pre_security_check(env, msg_ctx, actions,  soap_envelope, sec_node);
-    if(AXIS2_FAILURE == status){
-        return AXIS2_FAILURE;
-    }
-#endif
-*/
-    /*TO DO*/
-    /*There should be method to verify the security header before processing*/
 
     AXIS2_LOG_INFO(env->log, "[rampart][shp] Process security header");
 
@@ -1019,12 +878,6 @@
        AXIS2_LOG_INFO(env->log, "[rampart][shp] Invalid binding type.");
        return AXIS2_FAILURE;
     }        
-    /*
-    status = rampart_shp_post_security_check(env, msg_ctx, actions); 
-    if(AXIS2_FAILURE == status){
-        AXIS2_LOG_INFO(env->log, "[rampart][shp] Security header doesn't confirms reciever's policy");
-        return AXIS2_FAILURE;
-    }*/
 
 }
 

Modified: webservices/axis2/trunk/c/rampart/test/openssl/sign/test.c
URL: http://svn.apache.org/viewvc/webservices/axis2/trunk/c/rampart/test/openssl/sign/test.c?view=diff&rev=520295&r1=520294&r2=520295
==============================================================================
--- webservices/axis2/trunk/c/rampart/test/openssl/sign/test.c (original)
+++ webservices/axis2/trunk/c/rampart/test/openssl/sign/test.c Mon Mar 19 23:18:39 2007
@@ -114,7 +114,7 @@
     int len = -1;
 
     env = axis2_env_create_all("./openssl.log", AXIS2_LOG_LEVEL_TRACE);
-
+#if 0
     /*new code*/
     {
         axis2_char_t *c14op = NULL;
@@ -129,7 +129,7 @@
         return 0;
     }
     /*eof new code*/
-
+#endif
     /*Load private key*/
     prvkey = oxs_key_mgr_load_private_key_from_pem_file(env, "key.pem", "");
     if(!prvkey){



---------------------------------------------------------------------
To unsubscribe, e-mail: axis-cvs-unsubscribe@ws.apache.org
For additional commands, e-mail: axis-cvs-help@ws.apache.org