Functions | |
| AXIS2_EXTERN axis2_status_t | rampart_token_process_key_info (const axutil_env_t *env, axiom_node_t *key_info_node, axiom_node_t *sec_node, rampart_context_t *rampart_context, axis2_msg_ctx_t *msg_ctx, axis2_bool_t is_signature, oxs_x509_cert_t **cert, oxs_key_t **key, axis2_char_t **token_type, axis2_char_t **reference_method) |
| AXIS2_EXTERN axis2_status_t rampart_token_process_key_info | ( | const axutil_env_t * | env, | |
| axiom_node_t * | key_info_node, | |||
| axiom_node_t * | sec_node, | |||
| rampart_context_t * | rampart_context, | |||
| axis2_msg_ctx_t * | msg_ctx, | |||
| axis2_bool_t | is_signature, | |||
| oxs_x509_cert_t ** | cert, | |||
| oxs_key_t ** | key, | |||
| axis2_char_t ** | token_type, | |||
| axis2_char_t ** | reference_method | |||
| ) |
Extract certificate/session_key related information using given key_info node and scope node This will extract either certificate(asymmetric signing) or session_key (symmetric signing)
| env | Environment structure | |
| key_info_node | key info node. | |
| sec_node | security header node | |
| rampart_context | rampart context where key details could be found. | |
| msg_ctx | message context | |
| is_signature | boolean denoting whether the key_info is for signature | |
| cert | where the certificate extracted (if any) should be populated | |
| key | where the session key extracted (if any) should be populated | |
| token_type | where the token type should be populated | |
| reference_method | where the token reference method should be populated |
1.5.7.1