Functions | |
AXIS2_EXTERN axis2_status_t | rampart_shp_process_sec_header (const axutil_env_t *env, axis2_msg_ctx_t *msg_ctx, rampart_context_t *rampart_context, axiom_soap_envelope_t *soap_envelope, axiom_node_t *sec_node) |
AXIS2_EXTERN axis2_status_t | rampart_shp_add_security_context_token (const axutil_env_t *env, axis2_char_t *identifier, axis2_char_t *key_name, rampart_context_t *rampart_context, axis2_msg_ctx_t *msg_ctx) |
AXIS2_EXTERN axis2_status_t rampart_shp_process_sec_header | ( | const axutil_env_t * | env, | |
axis2_msg_ctx_t * | msg_ctx, | |||
rampart_context_t * | rampart_context, | |||
axiom_soap_envelope_t * | soap_envelope, | |||
axiom_node_t * | sec_node | |||
) |
Processes a message depending on it's security related claims. This is the main module in the infow of a message if rampart is enabled. Processing is depending on the order of tokens apear in the Also the module will check for security policy settings
env | pointer to environment struct | |
msg_ctx | message context | |
soap_envelope | the SOAP envelope | |
sec_node | The security element |