WSO2-WSF-Perl
view release on metacpan or search on metacpan
WSFC_wrap.c view on Meta::CPAN
}
}
} while(count > 0);
return;
}
void wsf_set_security_data_to_rampart_context(axutil_env_t *env,
rampart_context_t *rampart_context,
axis2_char_t *private_key,
axis2_char_t *certificate,
axis2_char_t *receiver_certificate,
axis2_char_t *user,
axis2_char_t *password,
axis2_char_t *password_type,
int ttl)
{
if (NULL != private_key) {
if (rampart_context_set_prv_key(rampart_context, env, (void *) private_key) == AXIS2_SUCCESS)
AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[wsf_sec_policy] setting pvt key ");
if (rampart_context_set_prv_key_type(rampart_context, env, AXIS2_KEY_TYPE_PEM) == AXIS2_SUCCESS)
AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[wsf_sec_policy] setting pvt key format ");
}
if (NULL != certificate) {
if (rampart_context_set_certificate(rampart_context, env, (void *)certificate) == AXIS2_SUCCESS)
AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[wsf_sec_policy] setting pub key");
if (rampart_context_set_certificate_type(rampart_context, env, AXIS2_KEY_TYPE_PEM) == AXIS2_SUCCESS)
AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[wsf_sec_policy] setting pub key type");
WSFC_wrap.c view on Meta::CPAN
if ((ttl > 0) && (rampart_context_set_ttl(rampart_context, env, ttl) == AXIS2_SUCCESS))
AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI, "[wsf_sec_policy) setting ttl");
}
void handle_client_security(axutil_env_t *env,
axis2_svc_client_t *svc_client,
axiom_node_t *incoming_policy_node,
axis2_char_t *private_key,
axis2_char_t *certificate,
axis2_char_t *receiver_certificate,
axis2_char_t *user,
axis2_char_t *password,
axis2_char_t *password_type,
int ttl)
{
axiom_element_t *root = NULL;
neethi_policy_t *neethi_policy = NULL;
axis2_svc_t *svc = NULL;
WSFC_wrap.c view on Meta::CPAN
desc = axis2_svc_get_base(svc, env);
policy_include = axis2_desc_get_policy_include(desc, env);
axis2_policy_include_add_policy_element(policy_include, env, AXIS2_SERVICE_POLICY, neethi_policy);
svc_ctx = axis2_svc_client_get_svc_ctx(svc_client, env);
if (NULL != svc_ctx) {
conf_ctx = axis2_svc_ctx_get_conf_ctx(svc_ctx, env);
if (NULL != conf_ctx) {
conf = axis2_conf_ctx_get_conf(conf_ctx, env);
if (NULL != conf) {
rampart_ctx = rampart_context_create(env);
wsf_set_security_data_to_rampart_context(env, rampart_ctx, private_key, certificate, receiver_certificate, user, password, password_type, ttl);
security_param = axutil_param_create(env, (axis2_char_t *) WSF_RAMPART_CONFIGURATION, rampart_ctx);
if (NULL != security_param)
axis2_conf_add_param(conf, env, security_param);
}
}
}
}
}
}
}
WSFC_wrap.c view on Meta::CPAN
int alloc7 = 0 ;
int res8 ;
char *buf8 = 0 ;
int alloc8 = 0 ;
int val9 ;
int ecode9 = 0 ;
int argvi = 0;
dXSARGS;
if ((items < 9) || (items > 9)) {
SWIG_croak("Usage: wsf_set_security_data_to_rampart_context(env,rampart_context,private_key,certificate,receiver_certificate,user,password,password_type,ttl);");
}
res1 = SWIG_ConvertPtr(ST(0), &argp1,SWIGTYPE_p_axutil_env_t, 0 | 0 );
if (!SWIG_IsOK(res1)) {
SWIG_exception_fail(SWIG_ArgError(res1), "in method '" "wsf_set_security_data_to_rampart_context" "', argument " "1"" of type '" "axutil_env_t *""'");
}
arg1 = (axutil_env_t *)(argp1);
res2 = SWIG_ConvertPtr(ST(1), &argp2,SWIGTYPE_p_rampart_context_t, 0 | 0 );
if (!SWIG_IsOK(res2)) {
SWIG_exception_fail(SWIG_ArgError(res2), "in method '" "wsf_set_security_data_to_rampart_context" "', argument " "2"" of type '" "rampart_context_t *""'");
}
WSFC_wrap.c view on Meta::CPAN
int alloc8 = 0 ;
int res9 ;
char *buf9 = 0 ;
int alloc9 = 0 ;
int val10 ;
int ecode10 = 0 ;
int argvi = 0;
dXSARGS;
if ((items < 10) || (items > 10)) {
SWIG_croak("Usage: handle_client_security(env,svc_client,incoming_policy_node,private_key,certificate,receiver_certificate,user,password,password_type,ttl);");
}
res1 = SWIG_ConvertPtr(ST(0), &argp1,SWIGTYPE_p_axutil_env_t, 0 | 0 );
if (!SWIG_IsOK(res1)) {
SWIG_exception_fail(SWIG_ArgError(res1), "in method '" "handle_client_security" "', argument " "1"" of type '" "axutil_env_t *""'");
}
arg1 = (axutil_env_t *)(argp1);
res2 = SWIG_ConvertPtr(ST(1), &argp2,SWIGTYPE_p_axis2_svc_client_t, 0 | 0 );
if (!SWIG_IsOK(res2)) {
SWIG_exception_fail(SWIG_ArgError(res2), "in method '" "handle_client_security" "', argument " "2"" of type '" "axis2_svc_client_t *""'");
}
WSFC_wrap.c view on Meta::CPAN
sv_setsv(sv, SWIG_FromCharPtr("KEY_FILE"));
SvREADONLY_on(sv);
} while(0) /*@SWIG@*/;
/*@SWIG:/usr/share/swig/1.3.33/perl5/perltypemaps.swg,64,%set_constant@*/ do {
SV *sv = get_sv((char*) SWIG_prefix "WSF_PROP_NAME_SSL_PASSPHRASE", TRUE | 0x2);
sv_setsv(sv, SWIG_FromCharPtr("SSL_PASSPHRASE"));
SvREADONLY_on(sv);
} while(0) /*@SWIG@*/;
/*@SWIG:/usr/share/swig/1.3.33/perl5/perltypemaps.swg,64,%set_constant@*/ do {
SV *sv = get_sv((char*) SWIG_prefix "WSF_SEC_TOK_OPT_PRIVATE_KEY", TRUE | 0x2);
sv_setsv(sv, SWIG_FromCharPtr("private_key"));
SvREADONLY_on(sv);
} while(0) /*@SWIG@*/;
/*@SWIG:/usr/share/swig/1.3.33/perl5/perltypemaps.swg,64,%set_constant@*/ do {
SV *sv = get_sv((char*) SWIG_prefix "WSF_SEC_TOK_OPT_CERT", TRUE | 0x2);
sv_setsv(sv, SWIG_FromCharPtr("certificate"));
SvREADONLY_on(sv);
} while(0) /*@SWIG@*/;
/*@SWIG:/usr/share/swig/1.3.33/perl5/perltypemaps.swg,64,%set_constant@*/ do {
SV *sv = get_sv((char*) SWIG_prefix "WSF_SEC_TOK_OPT_REC_CERT", TRUE | 0x2);
sv_setsv(sv, SWIG_FromCharPtr("receiver_certificate"));
( run in 0.636 second using v1.01-cache-2.11-cpan-a5abf4f5562 )