You are viewing a plain text version of this content. The canonical link for it is here.
Posted to rampart-dev@ws.apache.org by ka...@apache.org on 2008/04/08 12:14:34 UTC

svn commit: r645825 - in /webservices/rampart/trunk/c/src/util: rampart_sec_header_builder.c rampart_sec_header_processor.c

Author: kaushalye
Date: Tue Apr  8 03:14:25 2008
New Revision: 645825

URL: http://svn.apache.org/viewvc?rev=645825&view=rev
Log:
Fixing log messages

Modified:
    webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c
    webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c

Modified: webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c
URL: http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c?rev=645825&r1=645824&r2=645825&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c Tue Apr  8 03:14:25 2008
@@ -450,7 +450,7 @@
     server_side = axis2_msg_ctx_get_server_side(msg_ctx, env);
     if(!sec_header_block)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][shb] Security header block is NULL");
+        AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shb] Security header block is NULL");
 		axiom_namespace_free(sec_ns_obj, env);
         return AXIS2_SUCCESS;
     }
@@ -468,7 +468,7 @@
     {
         int ttl = -1;
         AXIS2_LOG_INFO(env->log, "[rampart][shb] Building Timestamp Token");
-        AXIS2_LOG_INFO(env->log, "[rampart][shb] Using default timeToLive value %d",
+        AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shb] Using default timeToLive value %d",
                        RAMPART_TIMESTAMP_TOKEN_DEFAULT_TIME_TO_LIVE);
         ttl = rampart_context_get_ttl(rampart_context,env);
 
@@ -493,7 +493,7 @@
             /*Now we are passing rampart_context here so inside this method
             relevant parameters are extracted. */
 
-            AXIS2_LOG_INFO(env->log, "[rampart][shb]  building UsernmaeToken");
+            AXIS2_LOG_INFO(env->log, "[rampart][shb] Building UsernmaeToken");
             status = rampart_username_token_build(
                         env,
                         rampart_context,
@@ -551,7 +551,7 @@
     {
         axis2_status_t status = AXIS2_FAILURE;
 
-        AXIS2_LOG_INFO(env->log,  "[rampart][shb] Asymmetric Binding. ");
+        AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shb] Asymmetric Binding. ");
         status = rampart_shb_do_asymmetric_binding(env, msg_ctx, rampart_context, soap_envelope, sec_node, sec_ns_obj, sign_parts_list);
 		axiom_namespace_free(sec_ns_obj, env);
         if(AXIS2_FAILURE == status){
@@ -575,7 +575,7 @@
         axis2_status_t status = AXIS2_FAILURE;
 
         /*Do Symmetric_binding specific things*/
-        AXIS2_LOG_INFO(env->log, "[rampart][shb] Symmetric Binding. ");
+        AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shb] Symmetric Binding. ");
         status = rampart_shb_do_symmetric_binding(env, msg_ctx, rampart_context, soap_envelope, sec_node, sec_ns_obj, sign_parts_list);
 		axiom_namespace_free(sec_ns_obj, env);
         if(AXIS2_FAILURE == status){
@@ -594,7 +594,7 @@
     }
     else if((rampart_context_get_binding_type(rampart_context,env)) == RP_PROPERTY_TRANSPORT_BINDING)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][shb]  Using transport binding");
+        AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shb] Using transport binding");
 		axiom_namespace_free(sec_ns_obj, env);
         axutil_array_list_free(sign_parts_list, env);
         return AXIS2_SUCCESS;

Modified: webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c
URL: http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c?rev=645825&r1=645824&r2=645825&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c Tue Apr  8 03:14:25 2008
@@ -1475,12 +1475,12 @@
 
         if((NULL == rampart_context_get_rd_val(rampart_context, env)) && (NULL == rampart_context_get_replay_detector_name(rampart_context, env)))
 		{
-            AXIS2_LOG_INFO(env->log, "[rampart][shp] Replay detection is not specified. Nothing to do");
+            AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shp] Replay detection is not specified. Nothing to do");
             need_replay_detection = AXIS2_FALSE;
         }
 		else
 		{
-            AXIS2_LOG_INFO(env->log, "[rampart][shp] Checking message for replay.");
+            AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shp] Checking message for replay.");
             need_replay_detection = AXIS2_TRUE;
         }
         if(AXIS2_TRUE == need_replay_detection)
@@ -1534,7 +1534,7 @@
 				}
 				else
 				{
-					AXIS2_LOG_INFO(env->log, "[rampart][shp] No replay detection function specified. Nothing to do. ");
+					AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shp] No replay detection function specified. Nothing to do. ");
 				}
 			}
         }
@@ -1638,7 +1638,7 @@
     axis2_status_t status = AXIS2_FAILURE;
     axis2_bool_t first_signature= AXIS2_TRUE;
 
-    AXIS2_LOG_INFO(env->log, "[rampart][shp] Processing security header in Strict layout");
+    AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shp] Processing security header in Strict layout");
 
     cur_node = axiom_node_get_first_child(sec_node, env);
 
@@ -1648,7 +1648,7 @@
         axis2_char_t *cur_local_name = NULL;
         
         cur_local_name = axiom_util_get_localname(cur_node, env);
-        AXIS2_LOG_INFO(env->log, "[rampart][shp] Processing security header element %s", cur_local_name);
+        AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shp] Processing security header element %s", cur_local_name);
 
         if(0 == axutil_strcmp(cur_local_name, OXS_NODE_ENCRYPTED_KEY))
         {
@@ -1716,7 +1716,7 @@
             /*We do nothing.*/
             status = AXIS2_SUCCESS;
         }else{
-            AXIS2_LOG_INFO(env->log, "[rampart][shp] Unknown security header %s", cur_local_name);
+            AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[rampart][shp] Unknown security header %s", cur_local_name);
             status = AXIS2_SUCCESS;
         }