SAML 2.0 Core Assertion namespace unit tests.
[shibboleth/cpp-opensaml.git] / saml / saml2 / core / impl / Assertions20Impl.cpp
1 /*
2  *  Copyright 2001-2006 Internet2
3  * 
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *     http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16
17 /**
18  * Assertions20Impl.cpp
19  * 
20  * Implementation classes for SAML 2.0 Assertions schema
21  */
22
23 #include "internal.h"
24 #include "exceptions.h"
25 #include "saml/encryption/EncryptedKeyResolver.h"
26 #include "saml2/core/Assertions.h"
27
28 #include <xmltooling/AbstractChildlessElement.h>
29 #include <xmltooling/AbstractComplexElement.h>
30 #include <xmltooling/AbstractElementProxy.h>
31 #include <xmltooling/AbstractSimpleElement.h>
32 #include <xmltooling/encryption/Decrypter.h>
33 #include <xmltooling/impl/AnyElement.h>
34 #include <xmltooling/io/AbstractXMLObjectMarshaller.h>
35 #include <xmltooling/io/AbstractXMLObjectUnmarshaller.h>
36 #include <xmltooling/util/XMLHelper.h>
37
38 #include <ctime>
39 #include <xercesc/util/XMLUniDefs.hpp>
40
41 using namespace opensaml::saml2;
42 using namespace opensaml;
43 using namespace xmlencryption;
44 using namespace xmlsignature;
45 using namespace xmltooling;
46 using namespace std;
47
48 #if defined (_MSC_VER)
49     #pragma warning( push )
50     #pragma warning( disable : 4250 4251 )
51 #endif
52
53 namespace opensaml {
54     namespace saml2 {
55     
56         DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,AssertionIDRef);
57         DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,AssertionURIRef);
58         DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,Audience);
59         DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,AuthnContextClassRef);
60         DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,AuthnContextDeclRef);
61         DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,AuthenticatingAuthority);
62
63         class SAML_DLLLOCAL NameIDTypeImpl : public virtual NameIDType,
64             public AbstractSimpleElement,
65             public AbstractChildlessElement,
66             public AbstractDOMCachingXMLObject,
67             public AbstractXMLObjectMarshaller,
68             public AbstractXMLObjectUnmarshaller
69         {
70             void init() {
71                 m_Format=m_SPProvidedID=m_NameQualifier=m_SPNameQualifier=NULL;
72             }
73             
74         protected:
75             NameIDTypeImpl() {
76                 init();
77             }
78             
79         public:
80             virtual ~NameIDTypeImpl() {
81                 XMLString::release(&m_NameQualifier);
82                 XMLString::release(&m_SPNameQualifier);
83                 XMLString::release(&m_Format);
84                 XMLString::release(&m_SPProvidedID);
85             }
86     
87             NameIDTypeImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
88                     : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
89                 init();
90             }
91                 
92             NameIDTypeImpl(const NameIDTypeImpl& src)
93                     : AbstractXMLObject(src), AbstractSimpleElement(src), AbstractDOMCachingXMLObject(src) {
94                 init();
95                 setNameQualifier(src.getNameQualifier());
96                 setSPNameQualifier(src.getSPNameQualifier());
97                 setFormat(src.getFormat());
98                 setSPProvidedID(src.getSPProvidedID());
99             }
100             
101             IMPL_XMLOBJECT_CLONE(NameIDType);
102             IMPL_STRING_ATTRIB(NameQualifier);
103             IMPL_STRING_ATTRIB(SPNameQualifier);
104             IMPL_STRING_ATTRIB(Format);
105             IMPL_STRING_ATTRIB(SPProvidedID);
106             IMPL_XMLOBJECT_CONTENT;
107     
108         protected:
109             void marshallAttributes(DOMElement* domElement) const {
110                 MARSHALL_STRING_ATTRIB(NameQualifier,NAMEQUALIFIER,NULL);
111                 MARSHALL_STRING_ATTRIB(SPNameQualifier,SPNAMEQUALIFIER,NULL);
112                 MARSHALL_STRING_ATTRIB(Format,FORMAT,NULL);
113                 MARSHALL_STRING_ATTRIB(SPProvidedID,SPPROVIDEDID,NULL);
114             }
115
116             void processAttribute(const DOMAttr* attribute) {
117                 PROC_STRING_ATTRIB(NameQualifier,NAMEQUALIFIER,NULL);
118                 PROC_STRING_ATTRIB(SPNameQualifier,SPNAMEQUALIFIER,NULL);
119                 PROC_STRING_ATTRIB(Format,FORMAT,NULL);
120                 PROC_STRING_ATTRIB(SPProvidedID,SPPROVIDEDID,NULL);
121                 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
122             }
123         };
124
125         class SAML_DLLLOCAL NameIDImpl : public virtual NameID, public NameIDTypeImpl
126         {
127         public:
128             virtual ~NameIDImpl() {}
129     
130             NameIDImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
131                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {}
132                 
133             NameIDImpl(const NameIDImpl& src) : AbstractXMLObject(src), NameIDTypeImpl(src) {}
134             
135             IMPL_XMLOBJECT_CLONE(NameID);
136             NameIDType* cloneNameIDType() const {
137                 return new NameIDImpl(*this);
138             }
139         };
140
141         class SAML_DLLLOCAL IssuerImpl : public virtual Issuer, public NameIDTypeImpl
142         {
143         public:
144             virtual ~IssuerImpl() {}
145     
146             IssuerImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
147                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {}
148                 
149             IssuerImpl(const IssuerImpl& src) : AbstractXMLObject(src), NameIDTypeImpl(src) {}
150             
151             IMPL_XMLOBJECT_CLONE(Issuer);
152             NameIDType* cloneNameIDType() const {
153                 return new IssuerImpl(*this);
154             }
155         };
156
157         //TODO unit test for this
158         //  - need to test encryption/decryption too, or already done in xmltooling ?
159         class SAML_DLLLOCAL EncryptedElementTypeImpl : public virtual EncryptedElementType,
160             public AbstractComplexElement,
161             public AbstractDOMCachingXMLObject,
162             public AbstractXMLObjectMarshaller,
163             public AbstractXMLObjectUnmarshaller
164         {
165             void init() {
166                 m_EncryptedData=NULL;
167                 m_children.push_back(NULL);
168                 m_pos_EncryptedData=m_children.begin();
169             }
170             
171         protected:
172             EncryptedElementTypeImpl() {
173                 init();
174             }
175             
176         public:
177             virtual ~EncryptedElementTypeImpl() {}
178     
179             EncryptedElementTypeImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
180                     : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
181                 init();
182             }
183                 
184             EncryptedElementTypeImpl(const EncryptedElementTypeImpl& src)
185                     : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
186                 init();
187                 if (src.getEncryptedData())
188                     setEncryptedData(src.getEncryptedData()->cloneEncryptedData());
189                 VectorOf(EncryptedKey) v=getEncryptedKeys();
190                 for (vector<EncryptedKey*>::const_iterator i=src.m_EncryptedKeys.begin(); i!=src.m_EncryptedKeys.end(); i++) {
191                     if (*i) {
192                         v.push_back((*i)->cloneEncryptedKey());
193                     }
194                 }
195             }
196     
197             XMLObject* decrypt(KeyResolver* KEKresolver, const XMLCh* recipient) const
198             {
199                 if (!m_EncryptedData)
200                     throw DecryptionException("No encrypted data present.");
201                 Decrypter decrypter(KEKresolver, new EncryptedKeyResolver(*this, recipient));
202                 DOMDocumentFragment* frag = decrypter.decryptData(m_EncryptedData);
203                 if (frag->hasChildNodes() && frag->getFirstChild()==frag->getLastChild()) {
204                     DOMNode* plaintext=frag->getFirstChild();
205                     if (plaintext->getNodeType()==DOMNode::ELEMENT_NODE) {
206                         auto_ptr<XMLObject> ret(XMLObjectBuilder::buildOneFromElement(static_cast<DOMElement*>(plaintext)));
207                         ret->releaseThisAndChildrenDOM();
208                         return ret.release();
209                     }
210                 }
211                 frag->release();
212                 throw DecryptionException("Decryption did not result in a single element.");
213             }
214         
215             IMPL_XMLOBJECT_CLONE(EncryptedElementType);
216             IMPL_TYPED_FOREIGN_CHILD(EncryptedData,xmlencryption);
217             IMPL_TYPED_FOREIGN_CHILDREN(EncryptedKey,xmlencryption,m_children.end());
218     
219         protected:
220             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
221                 PROC_TYPED_FOREIGN_CHILD(EncryptedData,xmlencryption,XMLConstants::XMLENC_NS,false);
222                 PROC_TYPED_FOREIGN_CHILDREN(EncryptedKey,xmlencryption,XMLConstants::XMLENC_NS,false);
223                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
224             }
225         };
226
227         //TODO unit test for this 
228         class SAML_DLLLOCAL EncryptedIDImpl : public virtual EncryptedID, public EncryptedElementTypeImpl
229         {
230         public:
231             virtual ~EncryptedIDImpl() {}
232     
233             EncryptedIDImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
234                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {}
235                 
236             EncryptedIDImpl(const EncryptedIDImpl& src) : AbstractXMLObject(src), EncryptedElementTypeImpl(src) {}
237             
238             IMPL_XMLOBJECT_CLONE(EncryptedID);
239             EncryptedElementType* cloneEncryptedElementType() const {
240                 return new EncryptedIDImpl(*this);
241             }
242         };
243
244         class SAML_DLLLOCAL AudienceRestrictionImpl : public virtual AudienceRestriction,
245             public AbstractComplexElement,
246             public AbstractDOMCachingXMLObject,
247             public AbstractXMLObjectMarshaller,
248             public AbstractXMLObjectUnmarshaller
249         {
250         public:
251             virtual ~AudienceRestrictionImpl() {}
252     
253             AudienceRestrictionImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
254                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
255             }
256                 
257             AudienceRestrictionImpl(const AudienceRestrictionImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
258                 VectorOf(Audience) v=getAudiences();
259                 for (vector<Audience*>::const_iterator i=src.m_Audiences.begin(); i!=src.m_Audiences.end(); i++) {
260                     if (*i) {
261                         v.push_back((*i)->cloneAudience());
262                     }
263                 }
264             }
265             
266             IMPL_XMLOBJECT_CLONE(AudienceRestriction);
267             Condition* cloneCondition() const {
268                 return cloneAudienceRestriction();
269             }
270             IMPL_TYPED_CHILDREN(Audience,m_children.end());
271     
272         protected:
273             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
274                 PROC_TYPED_CHILDREN(Audience,SAMLConstants::SAML20_NS,false);
275                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
276             }
277         };
278
279         class SAML_DLLLOCAL OneTimeUseImpl : public virtual OneTimeUse,
280             public AbstractChildlessElement,
281             public AbstractDOMCachingXMLObject,
282             public AbstractXMLObjectMarshaller,
283             public AbstractXMLObjectUnmarshaller
284         {
285         public:
286             virtual ~OneTimeUseImpl() {}
287     
288             OneTimeUseImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
289                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
290             }
291                 
292             OneTimeUseImpl(const OneTimeUseImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
293             }
294             
295             IMPL_XMLOBJECT_CLONE(OneTimeUse);
296             Condition* cloneCondition() const {
297                 return cloneOneTimeUse();
298             }
299         };
300
301         class SAML_DLLLOCAL ProxyRestrictionImpl : public virtual ProxyRestriction,
302             public AbstractComplexElement,
303             public AbstractDOMCachingXMLObject,
304             public AbstractXMLObjectMarshaller,
305             public AbstractXMLObjectUnmarshaller
306         {
307         public:
308             virtual ~ProxyRestrictionImpl() {
309                 XMLString::release(&m_Count);
310             }
311     
312             ProxyRestrictionImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
313                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
314                 m_Count=NULL;
315             }
316                 
317             ProxyRestrictionImpl(const ProxyRestrictionImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
318                 setCount(src.m_Count);
319                 VectorOf(Audience) v=getAudiences();
320                 for (vector<Audience*>::const_iterator i=src.m_Audiences.begin(); i!=src.m_Audiences.end(); i++) {
321                     if (*i) {
322                         v.push_back((*i)->cloneAudience());
323                     }
324                 }
325             }
326             
327             IMPL_XMLOBJECT_CLONE(ProxyRestriction);
328             Condition* cloneCondition() const {
329                 return cloneProxyRestriction();
330             }
331             IMPL_TYPED_CHILDREN(Audience,m_children.end());
332             IMPL_INTEGER_ATTRIB(Count);
333     
334         protected:
335             void marshallAttributes(DOMElement* domElement) const {
336                 MARSHALL_INTEGER_ATTRIB(Count,COUNT,NULL);
337             }
338
339             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
340                 PROC_TYPED_CHILDREN(Audience,SAMLConstants::SAML20_NS,false);
341                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
342             }
343
344             void processAttribute(const DOMAttr* attribute) {
345                 PROC_INTEGER_ATTRIB(Count,COUNT,NULL);
346                 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
347             }
348         };
349
350
351         class SAML_DLLLOCAL ConditionsImpl : public virtual Conditions,
352             public AbstractComplexElement,
353             public AbstractDOMCachingXMLObject,
354             public AbstractXMLObjectMarshaller,
355             public AbstractXMLObjectUnmarshaller
356         {
357             void init() {
358                 m_NotBefore=m_NotOnOrAfter=NULL;
359             }
360         public:
361             virtual ~ConditionsImpl() {
362                 delete m_NotBefore;
363                 delete m_NotOnOrAfter;
364             }
365     
366             ConditionsImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
367                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
368                 init();
369             }
370                 
371             ConditionsImpl(const ConditionsImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
372                 init();
373                 setNotBefore(src.getNotBefore());
374                 setNotOnOrAfter(src.getNotOnOrAfter());
375
376                 for (list<XMLObject*>::const_iterator i=src.m_children.begin(); i!=src.m_children.end(); i++) {
377                     if (*i) {
378                         AudienceRestriction* arc=dynamic_cast<AudienceRestriction*>(*i);
379                         if (arc) {
380                             getAudienceRestrictions().push_back(arc->cloneAudienceRestriction());
381                             continue;
382                         }
383     
384                         OneTimeUse* dncc=dynamic_cast<OneTimeUse*>(*i);
385                         if (dncc) {
386                             getOneTimeUses().push_back(dncc->cloneOneTimeUse());
387                             continue;
388                         }
389     
390                         ProxyRestriction* prc=dynamic_cast<ProxyRestriction*>(*i);
391                         if (prc) {
392                             getProxyRestrictions().push_back(prc->cloneProxyRestriction());
393                             continue;
394                         }
395
396                         Condition* c=dynamic_cast<Condition*>(*i);
397                         if (c) {
398                             getConditions().push_back(c->cloneCondition());
399                             continue;
400                         }
401                     }
402                 }
403             }
404                         
405             IMPL_XMLOBJECT_CLONE(Conditions);
406             IMPL_DATETIME_ATTRIB(NotBefore,0);
407             IMPL_DATETIME_ATTRIB(NotOnOrAfter,SAMLTIME_MAX);
408             IMPL_TYPED_CHILDREN(AudienceRestriction, m_children.end());
409             IMPL_TYPED_CHILDREN(OneTimeUse,m_children.end());
410             IMPL_TYPED_CHILDREN(ProxyRestriction, m_children.end());
411             IMPL_TYPED_CHILDREN(Condition,m_children.end());
412     
413         protected:
414             void marshallAttributes(DOMElement* domElement) const {
415                 MARSHALL_DATETIME_ATTRIB(NotBefore,NOTBEFORE,NULL);
416                 MARSHALL_DATETIME_ATTRIB(NotOnOrAfter,NOTONORAFTER,NULL);
417             }
418     
419             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
420                 PROC_TYPED_CHILDREN(AudienceRestriction,SAMLConstants::SAML20_NS,false);
421                 PROC_TYPED_CHILDREN(OneTimeUse,SAMLConstants::SAML20_NS,false);
422                 PROC_TYPED_CHILDREN(ProxyRestriction,SAMLConstants::SAML20_NS,false);
423                 PROC_TYPED_CHILDREN(Condition,SAMLConstants::SAML20_NS,false);
424                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
425             }
426     
427             void processAttribute(const DOMAttr* attribute) {
428                 PROC_DATETIME_ATTRIB(NotBefore,NOTBEFORE,NULL);
429                 PROC_DATETIME_ATTRIB(NotOnOrAfter,NOTONORAFTER,NULL);
430                 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
431             }
432         };
433
434         class SAML_DLLLOCAL SubjectConfirmationDataImpl : public virtual SubjectConfirmationData, public AnyElementImpl
435         {
436             void init() {
437                 m_NotBefore=m_NotOnOrAfter=NULL;
438                 m_Recipient=m_InResponseTo=m_Address=NULL;
439             }
440         public:
441             virtual ~SubjectConfirmationDataImpl() {
442                 delete m_NotBefore;
443                 delete m_NotOnOrAfter;
444                 XMLString::release(&m_Recipient);
445                 XMLString::release(&m_InResponseTo);
446                 XMLString::release(&m_Address);
447             }
448     
449             SubjectConfirmationDataImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
450                     : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
451                 init();
452             }
453                 
454             SubjectConfirmationDataImpl(const SubjectConfirmationDataImpl& src) : AnyElementImpl(src) {
455                 init();
456                 setNotBefore(src.getNotBefore());
457                 setNotOnOrAfter(src.getNotOnOrAfter());
458                 setRecipient(src.getRecipient());
459                 setInResponseTo(src.getInResponseTo());
460                 setAddress(src.getAddress());
461             }
462             
463             IMPL_XMLOBJECT_CLONE(SubjectConfirmationData);
464             IMPL_DATETIME_ATTRIB(NotBefore,0);
465             IMPL_DATETIME_ATTRIB(NotOnOrAfter,SAMLTIME_MAX);
466             IMPL_STRING_ATTRIB(Recipient);
467             IMPL_STRING_ATTRIB(InResponseTo);
468             IMPL_STRING_ATTRIB(Address);
469             
470         public:
471             void setAttribute(QName& qualifiedName, const XMLCh* value) {
472                 if (!qualifiedName.hasNamespaceURI()) {
473                     if (XMLString::equals(qualifiedName.getLocalPart(),NOTBEFORE_ATTRIB_NAME)) {
474                         setNotBefore(value);
475                         return;
476                     }
477                     else if (XMLString::equals(qualifiedName.getLocalPart(),NOTONORAFTER_ATTRIB_NAME)) {
478                         setNotOnOrAfter(value);
479                         return;
480                     }
481                     else if (XMLString::equals(qualifiedName.getLocalPart(),RECIPIENT_ATTRIB_NAME)) {
482                         setRecipient(value);
483                         return;
484                     }
485                     else if (XMLString::equals(qualifiedName.getLocalPart(),INRESPONSETO_ATTRIB_NAME)) {
486                         setInResponseTo(value);
487                         return;
488                     }
489                     else if (XMLString::equals(qualifiedName.getLocalPart(),ADDRESS_ATTRIB_NAME)) {
490                         setAddress(value);
491                         return;
492                     }
493                 }
494                 AbstractAttributeExtensibleXMLObject::setAttribute(qualifiedName, value);
495             }
496
497         protected:
498             void marshallAttributes(DOMElement* domElement) const {
499                 MARSHALL_DATETIME_ATTRIB(NotBefore,NOTBEFORE,NULL);
500                 MARSHALL_DATETIME_ATTRIB(NotOnOrAfter,NOTONORAFTER,NULL);
501                 MARSHALL_STRING_ATTRIB(Recipient,RECIPIENT,NULL);
502                 MARSHALL_STRING_ATTRIB(InResponseTo,INRESPONSETO,NULL);
503                 MARSHALL_STRING_ATTRIB(Address,ADDRESS,NULL);
504                 AnyElementImpl::marshallAttributes(domElement);
505             }
506             
507             // The processAttributes hook is handled by AnyElementImpl
508         };
509
510         class SAML_DLLLOCAL KeyInfoConfirmationDataTypeImpl : public virtual KeyInfoConfirmationDataType,
511                 public AbstractComplexElement,
512                 public AbstractAttributeExtensibleXMLObject,
513                 public AbstractDOMCachingXMLObject,
514                 public AbstractXMLObjectMarshaller,
515                 public AbstractXMLObjectUnmarshaller
516         {
517             void init() {
518                 m_NotBefore=m_NotOnOrAfter=NULL;
519                 m_Recipient=m_InResponseTo=m_Address=NULL;
520             }
521         public:
522             virtual ~KeyInfoConfirmationDataTypeImpl() {
523                 delete m_NotBefore;
524                 delete m_NotOnOrAfter;
525                 XMLString::release(&m_Recipient);
526                 XMLString::release(&m_InResponseTo);
527                 XMLString::release(&m_Address);
528             }
529     
530             KeyInfoConfirmationDataTypeImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
531                     : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
532                 init();
533             }
534                 
535             KeyInfoConfirmationDataTypeImpl(const KeyInfoConfirmationDataTypeImpl& src)
536                     : AbstractXMLObject(src), AbstractAttributeExtensibleXMLObject(src), AbstractDOMCachingXMLObject(src) {
537                 init();
538                 setNotBefore(src.getNotBefore());
539                 setNotOnOrAfter(src.getNotOnOrAfter());
540                 setRecipient(src.getRecipient());
541                 setInResponseTo(src.getInResponseTo());
542                 setAddress(src.getAddress());
543                 VectorOf(KeyInfo) v=getKeyInfos();
544                 for (vector<KeyInfo*>::const_iterator i=src.m_KeyInfos.begin(); i!=src.m_KeyInfos.end(); i++) {
545                     if (*i) {
546                         v.push_back((*i)->cloneKeyInfo());
547                     }
548                 }
549             }
550             
551             IMPL_XMLOBJECT_CLONE(KeyInfoConfirmationDataType);
552             IMPL_DATETIME_ATTRIB(NotBefore,0);
553             IMPL_DATETIME_ATTRIB(NotOnOrAfter,SAMLTIME_MAX);
554             IMPL_STRING_ATTRIB(Recipient);
555             IMPL_STRING_ATTRIB(InResponseTo);
556             IMPL_STRING_ATTRIB(Address);
557             IMPL_TYPED_CHILDREN(KeyInfo,m_children.end());
558             
559         public:
560             void setAttribute(QName& qualifiedName, const XMLCh* value) {
561                 if (!qualifiedName.hasNamespaceURI()) {
562                     if (XMLString::equals(qualifiedName.getLocalPart(),NOTBEFORE_ATTRIB_NAME)) {
563                         setNotBefore(value);
564                         return;
565                     }
566                     else if (XMLString::equals(qualifiedName.getLocalPart(),NOTONORAFTER_ATTRIB_NAME)) {
567                         setNotOnOrAfter(value);
568                         return;
569                     }
570                     else if (XMLString::equals(qualifiedName.getLocalPart(),RECIPIENT_ATTRIB_NAME)) {
571                         setRecipient(value);
572                         return;
573                     }
574                     else if (XMLString::equals(qualifiedName.getLocalPart(),INRESPONSETO_ATTRIB_NAME)) {
575                         setInResponseTo(value);
576                         return;
577                     }
578                     else if (XMLString::equals(qualifiedName.getLocalPart(),ADDRESS_ATTRIB_NAME)) {
579                         setAddress(value);
580                         return;
581                     }
582                 }
583                 AbstractAttributeExtensibleXMLObject::setAttribute(qualifiedName, value);
584             }
585
586         protected:
587             void marshallAttributes(DOMElement* domElement) const {
588                 MARSHALL_DATETIME_ATTRIB(NotBefore,NOTBEFORE,NULL);
589                 MARSHALL_DATETIME_ATTRIB(NotOnOrAfter,NOTONORAFTER,NULL);
590                 MARSHALL_STRING_ATTRIB(Recipient,RECIPIENT,NULL);
591                 MARSHALL_STRING_ATTRIB(InResponseTo,INRESPONSETO,NULL);
592                 MARSHALL_STRING_ATTRIB(Address,ADDRESS,NULL);
593                 
594                 // Take care of wildcard.
595                 for (map<QName,XMLCh*>::const_iterator i=m_attributeMap.begin(); i!=m_attributeMap.end(); i++) {
596                     DOMAttr* attr=domElement->getOwnerDocument()->createAttributeNS(i->first.getNamespaceURI(),i->first.getLocalPart());
597                     if (i->first.hasPrefix())
598                         attr->setPrefix(i->first.getPrefix());
599                     attr->setNodeValue(i->second);
600                     domElement->setAttributeNode(attr);
601                 }
602             }
603     
604             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
605                 PROC_TYPED_CHILDREN(KeyInfo,XMLConstants::XMLSIG_NS,false);
606                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
607             }
608
609             void processAttribute(const DOMAttr* attribute) {
610                 QName q(attribute->getNamespaceURI(),attribute->getLocalName(),attribute->getPrefix()); 
611                 setAttribute(q,attribute->getNodeValue());
612             }
613         };
614
615         class SAML_DLLLOCAL SubjectConfirmationImpl : public virtual SubjectConfirmation,
616             public AbstractComplexElement,
617             public AbstractDOMCachingXMLObject,
618             public AbstractXMLObjectMarshaller,
619             public AbstractXMLObjectUnmarshaller
620         {
621             void init() {
622                 m_Method=NULL;
623                 m_BaseID=NULL;
624                 m_NameID=NULL;
625                 m_EncryptedID=NULL;
626                 m_SubjectConfirmationData=NULL;
627                 m_KeyInfoConfirmationDataType=NULL;
628                 m_children.push_back(NULL);
629                 m_children.push_back(NULL);
630                 m_children.push_back(NULL);
631                 m_children.push_back(NULL);
632                 m_pos_BaseID=m_children.begin();
633                 m_pos_NameID=m_pos_BaseID;
634                 ++m_pos_NameID;
635                 m_pos_EncryptedID=m_pos_NameID;
636                 ++m_pos_EncryptedID;
637                 m_pos_SubjectConfirmationData=m_pos_EncryptedID;
638                 ++m_pos_SubjectConfirmationData;
639                 m_pos_KeyInfoConfirmationDataType=m_pos_SubjectConfirmationData;
640                 ++m_pos_KeyInfoConfirmationDataType;
641             }
642         public:
643             virtual ~SubjectConfirmationImpl() {}
644     
645             SubjectConfirmationImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
646                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
647                 init();
648             }
649                 
650             SubjectConfirmationImpl(const SubjectConfirmationImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
651                 init();
652                 setMethod(src.getMethod());
653                 if (src.getBaseID())
654                     setBaseID(src.getBaseID()->cloneBaseID());
655                 if (src.getNameID())
656                     setNameID(src.getNameID()->cloneNameID());
657                 if (src.getEncryptedID())
658                     setEncryptedID(src.getEncryptedID()->cloneEncryptedID());
659                 if (src.getSubjectConfirmationData())
660                     setSubjectConfirmationData(src.getSubjectConfirmationData()->clone());
661                 if (src.getKeyInfoConfirmationDataType())
662                     setKeyInfoConfirmationDataType(src.getKeyInfoConfirmationDataType()->cloneKeyInfoConfirmationDataType());
663             }
664             
665             IMPL_XMLOBJECT_CLONE(SubjectConfirmation);
666             IMPL_STRING_ATTRIB(Method);
667             IMPL_TYPED_CHILD(BaseID);
668             IMPL_TYPED_CHILD(NameID);
669             IMPL_TYPED_CHILD(EncryptedID);
670             IMPL_XMLOBJECT_CHILD(SubjectConfirmationData);
671             IMPL_TYPED_CHILD(KeyInfoConfirmationDataType);
672     
673         protected:
674             void marshallAttributes(DOMElement* domElement) const {
675                 MARSHALL_STRING_ATTRIB(Method,METHOD,NULL);
676             }
677
678             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
679                 PROC_TYPED_CHILD(BaseID,SAMLConstants::SAML20_NS,false);
680                 PROC_TYPED_CHILD(NameID,SAMLConstants::SAML20_NS,false);
681                 PROC_TYPED_CHILD(EncryptedID,SAMLConstants::SAML20_NS,false);
682                 PROC_XMLOBJECT_CHILD(SubjectConfirmationData,SAMLConstants::SAML20_NS);
683                 PROC_TYPED_CHILD(KeyInfoConfirmationDataType,SAMLConstants::SAML20_NS,false);
684                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
685             }
686
687             void processAttribute(const DOMAttr* attribute) {
688                 PROC_STRING_ATTRIB(Method,METHOD,NULL);
689                 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
690             }
691         };
692
693         class SAML_DLLLOCAL SubjectImpl : public virtual Subject,
694             public AbstractComplexElement,
695             public AbstractDOMCachingXMLObject,
696             public AbstractXMLObjectMarshaller,
697             public AbstractXMLObjectUnmarshaller
698         {
699             void init() {
700                 m_BaseID=NULL;
701                 m_NameID=NULL;
702                 m_EncryptedID=NULL;
703                 m_children.push_back(NULL);
704                 m_children.push_back(NULL);
705                 m_children.push_back(NULL);
706                 m_pos_BaseID=m_children.begin();
707                 m_pos_NameID=m_pos_BaseID;
708                 ++m_pos_NameID;
709                 m_pos_EncryptedID=m_pos_NameID;
710                 ++m_pos_EncryptedID;
711             }
712         public:
713             virtual ~SubjectImpl() {}
714     
715             SubjectImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
716                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
717                 init();
718             }
719                 
720             SubjectImpl(const SubjectImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
721                 init();
722                 if (src.getBaseID())
723                     setBaseID(src.getBaseID()->cloneBaseID());
724                 if (src.getNameID())
725                     setNameID(src.getNameID()->cloneNameID());
726                 if (src.getEncryptedID())
727                     setEncryptedID(src.getEncryptedID()->cloneEncryptedID());
728                 VectorOf(SubjectConfirmation) v=getSubjectConfirmations();
729                 for (vector<SubjectConfirmation*>::const_iterator i=src.m_SubjectConfirmations.begin(); i!=src.m_SubjectConfirmations.end(); i++) {
730                     if (*i) {
731                         v.push_back((*i)->cloneSubjectConfirmation());
732                     }
733                 }
734             }
735             
736             IMPL_XMLOBJECT_CLONE(Subject);
737             IMPL_TYPED_CHILD(NameID);
738             IMPL_TYPED_CHILD(BaseID);
739             IMPL_TYPED_CHILD(EncryptedID);
740             IMPL_TYPED_CHILDREN(SubjectConfirmation,m_children.end());
741     
742         protected:
743             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
744                 PROC_TYPED_CHILD(BaseID,SAMLConstants::SAML20_NS,false);
745                 PROC_TYPED_CHILD(NameID,SAMLConstants::SAML20_NS,false);
746                 PROC_TYPED_CHILD(EncryptedID,SAMLConstants::SAML20_NS,false);
747                 PROC_TYPED_CHILDREN(SubjectConfirmation,SAMLConstants::SAML20_NS,false);
748                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
749             }
750         };
751
752         class SAML_DLLLOCAL SubjectLocalityImpl : public virtual SubjectLocality,
753             public AbstractChildlessElement,
754             public AbstractDOMCachingXMLObject,
755             public AbstractXMLObjectMarshaller,
756             public AbstractXMLObjectUnmarshaller
757         {
758             void init() {
759                 m_Address=m_DNSName=NULL;
760             }
761         public:
762             virtual ~SubjectLocalityImpl() {
763                 XMLString::release(&m_Address);
764                 XMLString::release(&m_DNSName);
765             }
766     
767             SubjectLocalityImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
768                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
769                 init();
770             }
771                 
772             SubjectLocalityImpl(const SubjectLocalityImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
773                 init();
774                 setAddress(src.getAddress());
775                 setDNSName(src.getDNSName());
776             }
777             
778             IMPL_XMLOBJECT_CLONE(SubjectLocality);
779             IMPL_STRING_ATTRIB(Address);
780             IMPL_STRING_ATTRIB(DNSName);
781     
782         protected:
783             void marshallAttributes(DOMElement* domElement) const {
784                 MARSHALL_STRING_ATTRIB(Address,ADDRESS,NULL);
785                 MARSHALL_STRING_ATTRIB(DNSName,DNSNAME,NULL);
786             }
787     
788             void processAttribute(const DOMAttr* attribute) {
789                 PROC_STRING_ATTRIB(Address,ADDRESS,NULL);
790                 PROC_STRING_ATTRIB(DNSName,DNSNAME,NULL);
791                 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
792             }
793         };
794
795         //TODO need unit test for this
796         class SAML_DLLLOCAL AuthnContextDeclImpl : public virtual AuthnContextDecl, public AnyElementImpl
797         {
798         public:
799             virtual ~AuthnContextDeclImpl() {}
800     
801             AuthnContextDeclImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
802                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
803             }
804                 
805             AuthnContextDeclImpl(const AuthnContextDeclImpl& src) : AnyElementImpl(src) {
806             }
807             
808             IMPL_XMLOBJECT_CLONE(AuthnContextDecl);
809         };
810
811         class SAML_DLLLOCAL AuthnContextImpl : public virtual AuthnContext,
812             public AbstractComplexElement,
813             public AbstractDOMCachingXMLObject,
814             public AbstractXMLObjectMarshaller,
815             public AbstractXMLObjectUnmarshaller
816         {
817             void init() {
818                 m_AuthnContextClassRef=NULL;
819                 m_AuthnContextDecl=NULL;
820                 m_AuthnContextDeclRef=NULL;
821                 m_children.push_back(NULL);
822                 m_children.push_back(NULL);
823                 m_children.push_back(NULL);
824                 m_pos_AuthnContextClassRef=m_children.begin();
825                 m_pos_AuthnContextDecl=m_pos_AuthnContextClassRef;
826                 ++m_pos_AuthnContextDecl;
827                 m_pos_AuthnContextDeclRef=m_pos_AuthnContextDecl;
828                 ++m_pos_AuthnContextDeclRef;
829             }
830         public:
831             virtual ~AuthnContextImpl() {}
832     
833             AuthnContextImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
834                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
835                 init();
836             }
837                 
838             AuthnContextImpl(const AuthnContextImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
839                 init();
840                 if (src.getAuthnContextClassRef())
841                     setAuthnContextClassRef(src.getAuthnContextClassRef()->cloneAuthnContextClassRef());
842                 if (src.getAuthnContextDecl())
843                     setAuthnContextDecl(src.getAuthnContextDecl()->clone());
844                 if (src.getAuthnContextDeclRef())
845                     setAuthnContextDeclRef(src.getAuthnContextDeclRef()->cloneAuthnContextDeclRef());
846                 VectorOf(AuthenticatingAuthority) v=getAuthenticatingAuthoritys();
847                 for (vector<AuthenticatingAuthority*>::const_iterator i=src.m_AuthenticatingAuthoritys.begin(); i!=src.m_AuthenticatingAuthoritys.end(); i++) {
848                     if (*i) {
849                         v.push_back((*i)->cloneAuthenticatingAuthority());
850                     }
851                 }
852             }
853             
854             IMPL_XMLOBJECT_CLONE(AuthnContext);
855             IMPL_TYPED_CHILD(AuthnContextClassRef);
856             IMPL_XMLOBJECT_CHILD(AuthnContextDecl);
857             IMPL_TYPED_CHILD(AuthnContextDeclRef);
858             IMPL_TYPED_CHILDREN(AuthenticatingAuthority,m_children.end());
859     
860         protected:
861             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
862                 PROC_TYPED_CHILD(AuthnContextClassRef,SAMLConstants::SAML20_NS,false);
863                 PROC_XMLOBJECT_CHILD(AuthnContextDecl,SAMLConstants::SAML20_NS);
864                 PROC_TYPED_CHILD(AuthnContextDeclRef,SAMLConstants::SAML20_NS,false);
865                 PROC_TYPED_CHILDREN(AuthenticatingAuthority,SAMLConstants::SAML20_NS,false);
866                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
867             }
868         };
869
870         class SAML_DLLLOCAL AuthnStatementImpl : public virtual AuthnStatement,
871             public AbstractComplexElement,
872             public AbstractDOMCachingXMLObject,
873             public AbstractXMLObjectMarshaller,
874             public AbstractXMLObjectUnmarshaller
875         {
876             void init() {
877                 m_AuthnInstant=NULL;
878                 m_SessionIndex=NULL;
879                 m_SessionNotOnOrAfter=NULL;
880                 m_SubjectLocality=NULL;
881                 m_AuthnContext=NULL;
882                 m_children.push_back(NULL);
883                 m_children.push_back(NULL);
884                 m_pos_SubjectLocality=m_children.begin();
885                 m_pos_AuthnContext=m_pos_SubjectLocality;
886                 ++m_pos_AuthnContext;
887             }
888         public:
889             virtual ~AuthnStatementImpl() {
890                 delete m_AuthnInstant;
891                 XMLString::release(&m_SessionIndex);
892                 delete m_SessionNotOnOrAfter;
893             }
894     
895             AuthnStatementImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
896                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
897                 init();
898             }
899                 
900             AuthnStatementImpl(const AuthnStatementImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
901                 init();
902                 setAuthnInstant(src.getAuthnInstant());
903                 setSessionIndex(src.getSessionIndex());
904                 setSessionNotOnOrAfter(src.getSessionNotOnOrAfter());
905                 if (src.getSubjectLocality())
906                     setSubjectLocality(src.getSubjectLocality()->cloneSubjectLocality());
907                 if (src.getAuthnContext())
908                     setAuthnContext(src.getAuthnContext()->cloneAuthnContext());
909             }
910             
911             IMPL_XMLOBJECT_CLONE(AuthnStatement);
912             Statement* cloneStatement() const {
913                 return cloneAuthnStatement();
914             }
915             IMPL_DATETIME_ATTRIB(AuthnInstant,0);
916             IMPL_STRING_ATTRIB(SessionIndex);
917             IMPL_DATETIME_ATTRIB(SessionNotOnOrAfter,SAMLTIME_MAX);
918             IMPL_TYPED_CHILD(SubjectLocality);
919             IMPL_TYPED_CHILD(AuthnContext);
920     
921         protected:
922             void marshallAttributes(DOMElement* domElement) const {
923                 MARSHALL_DATETIME_ATTRIB(AuthnInstant,AUTHNINSTANT,NULL);
924                 MARSHALL_STRING_ATTRIB(SessionIndex,SESSIONINDEX,NULL);
925                 MARSHALL_DATETIME_ATTRIB(SessionNotOnOrAfter,SESSIONNOTONORAFTER,NULL);
926             }
927     
928             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
929                 PROC_TYPED_CHILD(SubjectLocality,SAMLConstants::SAML20_NS,false);
930                 PROC_TYPED_CHILD(AuthnContext,SAMLConstants::SAML20_NS,false);
931                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
932             }
933     
934             void processAttribute(const DOMAttr* attribute) {
935                 PROC_DATETIME_ATTRIB(AuthnInstant,AUTHNINSTANT,NULL);
936                 PROC_STRING_ATTRIB(SessionIndex,SESSIONINDEX,NULL);
937                 PROC_DATETIME_ATTRIB(SessionNotOnOrAfter,SESSIONNOTONORAFTER,NULL);
938                 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
939             }
940         };
941
942         class SAML_DLLLOCAL ActionImpl : public virtual Action,
943             public AbstractSimpleElement,
944             public AbstractChildlessElement,
945             public AbstractDOMCachingXMLObject,
946             public AbstractXMLObjectMarshaller,
947             public AbstractXMLObjectUnmarshaller
948         {
949         public:
950             virtual ~ActionImpl() {
951                 XMLString::release(&m_Namespace);
952             }
953     
954             ActionImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
955                     : AbstractXMLObject(nsURI, localName, prefix, schemaType), m_Namespace(NULL) {
956             }
957                 
958             ActionImpl(const ActionImpl& src)
959                     : AbstractXMLObject(src), AbstractSimpleElement(src), AbstractDOMCachingXMLObject(src) {
960                 setNamespace(src.getNamespace());
961             }
962             
963             IMPL_XMLOBJECT_CLONE(Action);
964             IMPL_STRING_ATTRIB(Namespace);
965             IMPL_XMLOBJECT_CONTENT;
966     
967         protected:
968             void marshallAttributes(DOMElement* domElement) const {
969                 MARSHALL_STRING_ATTRIB(Namespace,NAMESPACE,NULL);
970             }
971
972             void processAttribute(const DOMAttr* attribute) {
973                 PROC_STRING_ATTRIB(Namespace,NAMESPACE,NULL);
974                 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
975             }
976         };
977
978         class SAML_DLLLOCAL EvidenceImpl : public virtual Evidence,
979             public AbstractComplexElement,
980             public AbstractDOMCachingXMLObject,
981             public AbstractXMLObjectMarshaller,
982             public AbstractXMLObjectUnmarshaller
983         {
984         public:
985             virtual ~EvidenceImpl() {}
986     
987             EvidenceImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
988                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
989             }
990                 
991             EvidenceImpl(const EvidenceImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
992                 for (list<XMLObject*>::const_iterator i=src.m_children.begin(); i!=src.m_children.end(); i++) {
993                     if (*i) {
994                         AssertionIDRef* ref=dynamic_cast<AssertionIDRef*>(*i);
995                         if (ref) {
996                             getAssertionIDRefs().push_back(ref->cloneAssertionIDRef());
997                             continue;
998                         }
999     
1000                         AssertionURIRef* uri=dynamic_cast<AssertionURIRef*>(*i);
1001                         if (uri) {
1002                             getAssertionURIRefs().push_back(uri->cloneAssertionURIRef());
1003                             continue;
1004                         }
1005
1006                         Assertion* assertion=dynamic_cast<Assertion*>(*i);
1007                         if (assertion) {
1008                             getAssertions().push_back(assertion->cloneAssertion());
1009                             continue;
1010                         }
1011                         
1012                         EncryptedAssertion* enc=dynamic_cast<EncryptedAssertion*>(*i);
1013                         if (enc) {
1014                             getEncryptedAssertions().push_back(enc->cloneEncryptedAssertion());
1015                             continue;
1016                         }
1017                     }
1018                 }
1019             }
1020             
1021             IMPL_XMLOBJECT_CLONE(Evidence);
1022             IMPL_TYPED_CHILDREN(AssertionIDRef,m_children.end());
1023             IMPL_TYPED_CHILDREN(AssertionURIRef,m_children.end());
1024             IMPL_TYPED_CHILDREN(Assertion,m_children.end());
1025             IMPL_TYPED_CHILDREN(EncryptedAssertion,m_children.end());
1026     
1027         protected:
1028             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1029                 PROC_TYPED_CHILDREN(AssertionIDRef,SAMLConstants::SAML20_NS,false);
1030                 PROC_TYPED_CHILDREN(AssertionURIRef,SAMLConstants::SAML20_NS,false);
1031                 PROC_TYPED_CHILDREN(Assertion,SAMLConstants::SAML20_NS,false);
1032                 PROC_TYPED_CHILDREN(EncryptedAssertion,SAMLConstants::SAML20_NS,false);
1033                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
1034             }
1035         };
1036
1037         class SAML_DLLLOCAL AuthzDecisionStatementImpl : public virtual AuthzDecisionStatement,
1038             public AbstractComplexElement,
1039             public AbstractDOMCachingXMLObject,
1040             public AbstractXMLObjectMarshaller,
1041             public AbstractXMLObjectUnmarshaller
1042         {
1043             void init() {
1044                 m_Resource=NULL;
1045                 m_Decision=NULL;
1046                 m_Evidence=NULL;
1047                 m_children.push_back(NULL);
1048                 m_pos_Evidence=m_children.begin();
1049             }
1050         public:
1051             virtual ~AuthzDecisionStatementImpl() {
1052                 XMLString::release(&m_Resource);
1053                 XMLString::release(&m_Decision);
1054             }
1055     
1056             AuthzDecisionStatementImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1057                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1058                 init();
1059             }
1060                 
1061             AuthzDecisionStatementImpl(const AuthzDecisionStatementImpl& src)
1062                     : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
1063                 init();
1064                 setResource(src.getResource());
1065                 setDecision(src.getDecision());
1066                 if (src.getEvidence())
1067                     setEvidence(src.getEvidence()->cloneEvidence());
1068                 VectorOf(Action) v=getActions();
1069                 for (vector<Action*>::const_iterator i=src.m_Actions.begin(); i!=src.m_Actions.end(); i++) {
1070                     if (*i) {
1071                         v.push_back((*i)->cloneAction());
1072                     }
1073                 }
1074             }
1075             
1076             IMPL_XMLOBJECT_CLONE(AuthzDecisionStatement);
1077             Statement* cloneStatement() const {
1078                 return cloneAuthzDecisionStatement();
1079             }
1080             IMPL_STRING_ATTRIB(Resource);
1081             IMPL_STRING_ATTRIB(Decision);
1082             IMPL_TYPED_CHILD(Evidence);
1083             IMPL_TYPED_CHILDREN(Action, m_pos_Evidence);
1084     
1085         protected:
1086             void marshallAttributes(DOMElement* domElement) const {
1087                 MARSHALL_STRING_ATTRIB(Resource,RESOURCE,NULL);
1088                 MARSHALL_STRING_ATTRIB(Decision,DECISION,NULL);
1089             }
1090     
1091             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1092                 PROC_TYPED_CHILD(Evidence,SAMLConstants::SAML20_NS,false);
1093                 PROC_TYPED_CHILDREN(Action,SAMLConstants::SAML20_NS,false);
1094                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
1095             }
1096     
1097             void processAttribute(const DOMAttr* attribute) {
1098                 PROC_STRING_ATTRIB(Resource,RESOURCE,NULL);
1099                 PROC_STRING_ATTRIB(Decision,DECISION,NULL);
1100                 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
1101             }
1102         };
1103
1104         //TODO need unit test for this
1105         class SAML_DLLLOCAL AttributeValueImpl : public virtual AttributeValue, public AnyElementImpl
1106         {
1107         public:
1108             virtual ~AttributeValueImpl() {}
1109     
1110             AttributeValueImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1111                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1112             }
1113                 
1114             AttributeValueImpl(const AttributeValueImpl& src) : AnyElementImpl(src) {
1115             }
1116             
1117             IMPL_XMLOBJECT_CLONE(AttributeValue);
1118         };
1119
1120
1121         class SAML_DLLLOCAL AttributeImpl : public virtual Attribute,
1122             public AbstractComplexElement,
1123             public AbstractAttributeExtensibleXMLObject,
1124             public AbstractDOMCachingXMLObject,
1125             public AbstractXMLObjectMarshaller,
1126             public AbstractXMLObjectUnmarshaller
1127         {
1128             void init() {
1129                 m_Name=m_NameFormat=m_FriendlyName=NULL;
1130             }
1131         public:
1132             virtual ~AttributeImpl() {
1133                 XMLString::release(&m_Name);
1134                 XMLString::release(&m_NameFormat);
1135                 XMLString::release(&m_FriendlyName);
1136             }
1137     
1138             AttributeImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1139                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1140                 init();
1141             }
1142                 
1143             AttributeImpl(const AttributeImpl& src)
1144                     : AbstractXMLObject(src), AbstractAttributeExtensibleXMLObject(src), AbstractDOMCachingXMLObject(src) {
1145                 init();
1146                 setName(src.getName());
1147                 setNameFormat(src.getNameFormat());
1148                 setFriendlyName(src.getFriendlyName());
1149                 VectorOf(XMLObject) v=getAttributeValues();
1150                 for (vector<XMLObject*>::const_iterator i=src.m_AttributeValues.begin(); i!=src.m_AttributeValues.end(); i++) {
1151                     if (*i) {
1152                         v.push_back((*i)->clone());
1153                     }
1154                 }
1155             }
1156             
1157             IMPL_XMLOBJECT_CLONE(Attribute);
1158             IMPL_STRING_ATTRIB(Name);
1159             IMPL_STRING_ATTRIB(NameFormat);
1160             IMPL_STRING_ATTRIB(FriendlyName);
1161             IMPL_XMLOBJECT_CHILDREN(AttributeValue,m_children.end());
1162     
1163             void setAttribute(QName& qualifiedName, const XMLCh* value) {
1164                 if (!qualifiedName.hasNamespaceURI()) {
1165                     if (XMLString::equals(qualifiedName.getLocalPart(),NAME_ATTRIB_NAME)) {
1166                         setName(value);
1167                         return;
1168                     }
1169                     else if (XMLString::equals(qualifiedName.getLocalPart(),NAMEFORMAT_ATTRIB_NAME)) {
1170                         setNameFormat(value);
1171                         return;
1172                     }
1173                     else if (XMLString::equals(qualifiedName.getLocalPart(),FRIENDLYNAME_ATTRIB_NAME)) {
1174                         setFriendlyName(value);
1175                         return;
1176                     }
1177                 }
1178                 AbstractAttributeExtensibleXMLObject::setAttribute(qualifiedName, value);
1179             }
1180
1181         protected:
1182             void marshallAttributes(DOMElement* domElement) const {
1183                 MARSHALL_STRING_ATTRIB(Name,NAME,NULL);
1184                 MARSHALL_STRING_ATTRIB(NameFormat,NAMEFORMAT,NULL);
1185                 MARSHALL_STRING_ATTRIB(FriendlyName,FRIENDLYNAME,NULL);
1186
1187                 // Take care of wildcard.
1188                 for (map<QName,XMLCh*>::const_iterator i=m_attributeMap.begin(); i!=m_attributeMap.end(); i++) {
1189                     DOMAttr* attr=domElement->getOwnerDocument()->createAttributeNS(i->first.getNamespaceURI(),i->first.getLocalPart());
1190                     if (i->first.hasPrefix())
1191                         attr->setPrefix(i->first.getPrefix());
1192                     attr->setNodeValue(i->second);
1193                     domElement->setAttributeNode(attr);
1194                 }
1195             }
1196
1197             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1198                 getAttributeValues().push_back(childXMLObject);
1199             }
1200
1201             void processAttribute(const DOMAttr* attribute) {
1202                 QName q(attribute->getNamespaceURI(),attribute->getLocalName(),attribute->getPrefix()); 
1203                 setAttribute(q,attribute->getNodeValue());
1204             }
1205         };
1206
1207         //TODO unit test for this 
1208         class SAML_DLLLOCAL EncryptedAttributeImpl : public virtual EncryptedAttribute, public EncryptedElementTypeImpl
1209         {
1210         public:
1211             virtual ~EncryptedAttributeImpl() {}
1212     
1213             EncryptedAttributeImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1214                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {}
1215                 
1216             EncryptedAttributeImpl(const EncryptedAttributeImpl& src) : AbstractXMLObject(src), EncryptedElementTypeImpl(src) {}
1217             
1218             IMPL_XMLOBJECT_CLONE(EncryptedAttribute);
1219             EncryptedElementType* cloneEncryptedElementType() const {
1220                 return new EncryptedAttributeImpl(*this);
1221             }
1222         };
1223
1224         class SAML_DLLLOCAL AttributeStatementImpl : public virtual AttributeStatement,
1225             public AbstractComplexElement,
1226             public AbstractDOMCachingXMLObject,
1227             public AbstractXMLObjectMarshaller,
1228             public AbstractXMLObjectUnmarshaller
1229         {
1230         public:
1231             virtual ~AttributeStatementImpl() {}
1232     
1233             AttributeStatementImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1234                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1235             }
1236                 
1237             AttributeStatementImpl(const AttributeStatementImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
1238                 for (list<XMLObject*>::const_iterator i=src.m_children.begin(); i!=src.m_children.end(); i++) {
1239                     if (*i) {
1240                         Attribute* attribute=dynamic_cast<Attribute*>(*i);
1241                         if (attribute) {
1242                             getAttributes().push_back(attribute->cloneAttribute());
1243                             continue;
1244                         }
1245                         
1246                         EncryptedAttribute* enc=dynamic_cast<EncryptedAttribute*>(*i);
1247                         if (enc) {
1248                             getEncryptedAttributes().push_back(enc->cloneEncryptedAttribute());
1249                             continue;
1250                         }
1251                     }
1252                 }
1253             }
1254             
1255             IMPL_XMLOBJECT_CLONE(AttributeStatement);
1256             Statement* cloneStatement() const {
1257                 return cloneAttributeStatement();
1258             }
1259             IMPL_TYPED_CHILDREN(Attribute, m_children.end());
1260             IMPL_TYPED_CHILDREN(EncryptedAttribute, m_children.end());
1261     
1262         protected:
1263             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1264                 PROC_TYPED_CHILDREN(Attribute,SAMLConstants::SAML20_NS,false);
1265                 PROC_TYPED_CHILDREN(EncryptedAttribute,SAMLConstants::SAML20_NS,false);
1266                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
1267             }
1268         };
1269
1270         class SAML_DLLLOCAL AdviceImpl : public virtual Advice,
1271             public AbstractComplexElement,
1272             public AbstractDOMCachingXMLObject,
1273             public AbstractXMLObjectMarshaller,
1274             public AbstractXMLObjectUnmarshaller
1275         {
1276         public:
1277             virtual ~AdviceImpl() {}
1278     
1279             AdviceImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1280                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1281             }
1282                 
1283             AdviceImpl(const AdviceImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
1284                 for (list<XMLObject*>::const_iterator i=src.m_children.begin(); i!=src.m_children.end(); i++) {
1285                     if (*i) {
1286                         AssertionIDRef* ref=dynamic_cast<AssertionIDRef*>(*i);
1287                         if (ref) {
1288                             getAssertionIDRefs().push_back(ref->cloneAssertionIDRef());
1289                             continue;
1290                         }
1291     
1292                         AssertionURIRef* uri=dynamic_cast<AssertionURIRef*>(*i);
1293                         if (uri) {
1294                             getAssertionURIRefs().push_back(uri->cloneAssertionURIRef());
1295                             continue;
1296                         }
1297
1298                         Assertion* assertion=dynamic_cast<Assertion*>(*i);
1299                         if (assertion) {
1300                             getAssertions().push_back(assertion->cloneAssertion());
1301                             continue;
1302                         }
1303                         
1304                         EncryptedAssertion* enc=dynamic_cast<EncryptedAssertion*>(*i);
1305                         if (enc) {
1306                             getEncryptedAssertions().push_back(enc->cloneEncryptedAssertion());
1307                             continue;
1308                         }
1309
1310                         getOthers().push_back((*i)->clone());
1311                     }
1312                 }
1313             }
1314             
1315             IMPL_XMLOBJECT_CLONE(Advice);
1316             IMPL_TYPED_CHILDREN(AssertionIDRef,m_children.end());
1317             IMPL_TYPED_CHILDREN(AssertionURIRef,m_children.end());
1318             IMPL_TYPED_CHILDREN(Assertion,m_children.end());
1319             IMPL_TYPED_CHILDREN(EncryptedAssertion,m_children.end());
1320             IMPL_XMLOBJECT_CHILDREN(Other,m_children.end());
1321     
1322         protected:
1323             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1324                 PROC_TYPED_CHILDREN(AssertionIDRef,SAMLConstants::SAML20_NS,false);
1325                 PROC_TYPED_CHILDREN(AssertionURIRef,SAMLConstants::SAML20_NS,false);
1326                 PROC_TYPED_CHILDREN(Assertion,SAMLConstants::SAML20_NS,false);
1327                 PROC_TYPED_CHILDREN(EncryptedAssertion,SAMLConstants::SAML20_NS,false);
1328                 
1329                 // Unknown child.
1330                 const XMLCh* nsURI=root->getNamespaceURI();
1331                 if (!XMLString::equals(nsURI,SAMLConstants::SAML20_NS) && nsURI && *nsURI) {
1332                     getOthers().push_back(childXMLObject);
1333                     return;
1334                 }
1335                 
1336                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
1337             }
1338         };
1339
1340         //TODO unit test for this 
1341         class SAML_DLLLOCAL EncryptedAssertionImpl : public virtual EncryptedAssertion, public EncryptedElementTypeImpl
1342         {
1343         public:
1344             virtual ~EncryptedAssertionImpl() {}
1345     
1346             EncryptedAssertionImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1347                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {}
1348                 
1349             EncryptedAssertionImpl(const EncryptedAssertionImpl& src) : AbstractXMLObject(src), EncryptedElementTypeImpl(src) {}
1350             
1351             IMPL_XMLOBJECT_CLONE(EncryptedAssertion);
1352             EncryptedElementType* cloneEncryptedElementType() const {
1353                 return new EncryptedAssertionImpl(*this);
1354             }
1355         };
1356
1357         class SAML_DLLLOCAL AssertionImpl : public virtual Assertion,
1358             public AbstractComplexElement,
1359             public AbstractDOMCachingXMLObject,
1360             public AbstractXMLObjectMarshaller,
1361             public AbstractXMLObjectUnmarshaller
1362         {
1363             void init() {
1364                 m_ID=NULL;
1365                 m_Version=NULL;
1366                 m_IssueInstant=NULL;
1367                 m_Issuer=NULL;
1368                 m_Signature=NULL;
1369                 m_Subject=NULL;
1370                 m_Conditions=NULL;
1371                 m_Advice=NULL;
1372                 m_children.push_back(NULL);
1373                 m_children.push_back(NULL);
1374                 m_children.push_back(NULL);
1375                 m_children.push_back(NULL);
1376                 m_children.push_back(NULL);
1377                 m_pos_Issuer=m_children.begin();
1378                 m_pos_Signature=m_pos_Issuer;
1379                 ++m_pos_Signature;
1380                 m_pos_Subject=m_pos_Signature;
1381                 ++m_pos_Subject;
1382                 m_pos_Conditions=m_pos_Subject;
1383                 ++m_pos_Conditions;
1384                 m_pos_Advice=m_pos_Conditions;
1385                 ++m_pos_Advice;
1386             }
1387         public:
1388             virtual ~AssertionImpl() {
1389                 XMLString::release(&m_ID);
1390                 XMLString::release(&m_Version);
1391                 delete m_IssueInstant;
1392             }
1393     
1394             AssertionImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1395                 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1396                 init();
1397             }
1398                 
1399             AssertionImpl(const AssertionImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
1400                 init();
1401                 setVersion(src.getVersion());
1402                 setID(src.getID());
1403                 setIssueInstant(src.getIssueInstant());
1404                 if (src.getIssuer())
1405                     setIssuer(src.getIssuer()->cloneIssuer());
1406                 if (src.getSignature())
1407                     setSignature(src.getSignature()->cloneSignature());
1408                 if (src.getSubject())
1409                     setSubject(src.getSubject()->cloneSubject());
1410                 if (src.getConditions())
1411                     setConditions(src.getConditions()->cloneConditions());
1412                 if (src.getAdvice())
1413                     setAdvice(src.getAdvice()->cloneAdvice());
1414                 for (list<XMLObject*>::const_iterator i=src.m_children.begin(); i!=src.m_children.end(); i++) {
1415                     if (*i) {
1416                         AuthnStatement* authst=dynamic_cast<AuthnStatement*>(*i);
1417                         if (authst) {
1418                             getAuthnStatements().push_back(authst->cloneAuthnStatement());
1419                             continue;
1420                         }
1421
1422                         AttributeStatement* attst=dynamic_cast<AttributeStatement*>(*i);
1423                         if (attst) {
1424                             getAttributeStatements().push_back(attst->cloneAttributeStatement());
1425                             continue;
1426                         }
1427
1428                         AuthzDecisionStatement* authzst=dynamic_cast<AuthzDecisionStatement*>(*i);
1429                         if (authzst) {
1430                             getAuthzDecisionStatements().push_back(authzst->cloneAuthzDecisionStatement());
1431                             continue;
1432                         }
1433     
1434                         Statement* st=dynamic_cast<Statement*>(*i);
1435                         if (st) {
1436                             getStatements().push_back(st->cloneStatement());
1437                             continue;
1438                         }
1439                     }
1440                 }
1441             }
1442             
1443             const XMLCh* getId() const {
1444                 return getID();
1445             }
1446
1447             //IMPL_TYPED_CHILD(Signature);
1448             // Need customized setter.
1449         protected:
1450             Signature* m_Signature;
1451             list<XMLObject*>::iterator m_pos_Signature;
1452         public:
1453             Signature* getSignature() const {
1454                 return m_Signature;
1455             }
1456             
1457             void setSignature(Signature* sig) {
1458                 prepareForAssignment(m_Signature,sig);
1459                 *m_pos_Signature=m_Signature=sig;
1460                 // Sync content reference back up.
1461                 if (m_Signature)
1462                     m_Signature->setContentReference(new opensaml::ContentReference(*this));
1463             }
1464             
1465             IMPL_XMLOBJECT_CLONE(Assertion);
1466             IMPL_STRING_ATTRIB(Version);
1467             IMPL_STRING_ATTRIB(ID);
1468             IMPL_DATETIME_ATTRIB(IssueInstant,0);
1469             IMPL_TYPED_CHILD(Issuer);
1470             IMPL_TYPED_CHILD(Subject);
1471             IMPL_TYPED_CHILD(Conditions);
1472             IMPL_TYPED_CHILD(Advice);
1473             IMPL_TYPED_CHILDREN(Statement, m_children.end());
1474             IMPL_TYPED_CHILDREN(AuthnStatement, m_children.end());
1475             IMPL_TYPED_CHILDREN(AttributeStatement, m_children.end());
1476             IMPL_TYPED_CHILDREN(AuthzDecisionStatement, m_children.end());
1477     
1478         protected:
1479             void marshallAttributes(DOMElement* domElement) const {
1480                 if (!m_Version)
1481                     const_cast<AssertionImpl*>(this)->m_Version=XMLString::transcode("2.0");
1482                 MARSHALL_STRING_ATTRIB(Version,VER,NULL);
1483                 if (!m_ID)
1484                     const_cast<AssertionImpl*>(this)->m_ID=SAMLConfig::getConfig().generateIdentifier();
1485                 MARSHALL_ID_ATTRIB(ID,ID,NULL);
1486                 if (!m_IssueInstant) {
1487                     const_cast<AssertionImpl*>(this)->m_IssueInstantEpoch=time(NULL);
1488                     const_cast<AssertionImpl*>(this)->m_IssueInstant=new DateTime(m_IssueInstantEpoch);
1489                 }
1490                 MARSHALL_DATETIME_ATTRIB(IssueInstant,ISSUEINSTANT,NULL);
1491             }
1492     
1493             void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1494                 PROC_TYPED_CHILD(Issuer,SAMLConstants::SAML20_NS,false);
1495                 PROC_TYPED_CHILD(Signature,XMLConstants::XMLSIG_NS,false);
1496                 PROC_TYPED_CHILD(Subject,SAMLConstants::SAML20_NS,false);
1497                 PROC_TYPED_CHILD(Conditions,SAMLConstants::SAML20_NS,false);
1498                 PROC_TYPED_CHILD(Advice,SAMLConstants::SAML20_NS,false);
1499                 PROC_TYPED_CHILDREN(AuthnStatement,SAMLConstants::SAML20_NS,false);
1500                 PROC_TYPED_CHILDREN(AttributeStatement,SAMLConstants::SAML20_NS,false);
1501                 PROC_TYPED_CHILDREN(AuthzDecisionStatement,SAMLConstants::SAML20_NS,false);
1502                 PROC_TYPED_CHILDREN(Statement,SAMLConstants::SAML20_NS,false);
1503                 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
1504             }
1505     
1506             void processAttribute(const DOMAttr* attribute) {
1507                 PROC_STRING_ATTRIB(Version,VER,NULL);
1508                 PROC_ID_ATTRIB(ID,ID,NULL);
1509                 PROC_DATETIME_ATTRIB(IssueInstant,ISSUEINSTANT,NULL);
1510                 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
1511             }
1512         };
1513
1514     };
1515 };
1516
1517 #if defined (_MSC_VER)
1518     #pragma warning( pop )
1519 #endif
1520
1521 // Builder Implementations
1522
1523 IMPL_XMLOBJECTBUILDER(Action);
1524 IMPL_XMLOBJECTBUILDER(Advice);
1525 IMPL_XMLOBJECTBUILDER(Assertion);
1526 IMPL_XMLOBJECTBUILDER(AssertionIDRef);
1527 IMPL_XMLOBJECTBUILDER(AssertionURIRef);
1528 IMPL_XMLOBJECTBUILDER(Attribute);
1529 IMPL_XMLOBJECTBUILDER(AttributeStatement);
1530 IMPL_XMLOBJECTBUILDER(AttributeValue);
1531 IMPL_XMLOBJECTBUILDER(Audience);
1532 IMPL_XMLOBJECTBUILDER(AudienceRestriction);
1533 IMPL_XMLOBJECTBUILDER(AuthenticatingAuthority);
1534 IMPL_XMLOBJECTBUILDER(AuthnContext);
1535 IMPL_XMLOBJECTBUILDER(AuthnContextClassRef);
1536 IMPL_XMLOBJECTBUILDER(AuthnContextDecl);
1537 IMPL_XMLOBJECTBUILDER(AuthnContextDeclRef);
1538 IMPL_XMLOBJECTBUILDER(AuthnStatement);
1539 IMPL_XMLOBJECTBUILDER(AuthzDecisionStatement);
1540 IMPL_XMLOBJECTBUILDER(Conditions);
1541 IMPL_XMLOBJECTBUILDER(EncryptedAssertion);
1542 IMPL_XMLOBJECTBUILDER(EncryptedAttribute);
1543 IMPL_XMLOBJECTBUILDER(EncryptedID);
1544 IMPL_XMLOBJECTBUILDER(Evidence);
1545 IMPL_XMLOBJECTBUILDER(Issuer);
1546 IMPL_XMLOBJECTBUILDER(KeyInfoConfirmationDataType);
1547 IMPL_XMLOBJECTBUILDER(NameID);
1548 IMPL_XMLOBJECTBUILDER(NameIDType);
1549 IMPL_XMLOBJECTBUILDER(OneTimeUse);
1550 IMPL_XMLOBJECTBUILDER(ProxyRestriction);
1551 IMPL_XMLOBJECTBUILDER(Subject);
1552 IMPL_XMLOBJECTBUILDER(SubjectConfirmation);
1553 IMPL_XMLOBJECTBUILDER(SubjectConfirmationData);
1554 IMPL_XMLOBJECTBUILDER(SubjectLocality);
1555
1556 // Unicode literals
1557 const XMLCh Action::LOCAL_NAME[] =                  UNICODE_LITERAL_6(A,c,t,i,o,n);
1558 const XMLCh Action::TYPE_NAME[] =                   UNICODE_LITERAL_10(A,c,t,i,o,n,T,y,p,e);
1559 const XMLCh Action::NAMESPACE_ATTRIB_NAME[] =       UNICODE_LITERAL_9(N,a,m,e,s,p,a,c,e);
1560 const XMLCh Advice::LOCAL_NAME[] =                  UNICODE_LITERAL_6(A,d,v,i,c,e);
1561 const XMLCh Advice::TYPE_NAME[] =                   UNICODE_LITERAL_10(A,d,v,i,c,e,T,y,p,e);
1562 const XMLCh Assertion::LOCAL_NAME[] =               UNICODE_LITERAL_9(A,s,s,e,r,t,i,o,n);
1563 const XMLCh Assertion::TYPE_NAME[] =                UNICODE_LITERAL_13(A,s,s,e,r,t,i,o,n,T,y,p,e);
1564 const XMLCh Assertion::VER_ATTRIB_NAME[] =          UNICODE_LITERAL_7(V,e,r,s,i,o,n);
1565 const XMLCh Assertion::ID_ATTRIB_NAME[] =           UNICODE_LITERAL_2(I,D);
1566 const XMLCh Assertion::ISSUEINSTANT_ATTRIB_NAME[] = UNICODE_LITERAL_12(I,s,s,u,e,I,n,s,t,a,n,t);
1567 const XMLCh AssertionIDRef::LOCAL_NAME[] =          UNICODE_LITERAL_14(A,s,s,e,r,t,i,o,n,I,D,R,e,f);
1568 const XMLCh AssertionURIRef::LOCAL_NAME[] =         UNICODE_LITERAL_15(A,s,s,e,r,t,i,o,n,U,R,I,R,e,f);
1569 const XMLCh Attribute::LOCAL_NAME[] =               UNICODE_LITERAL_9(A,t,t,r,i,b,u,t,e);
1570 const XMLCh Attribute::TYPE_NAME[] =                UNICODE_LITERAL_13(A,t,t,r,i,b,u,t,e,T,y,p,e);
1571 const XMLCh Attribute::NAME_ATTRIB_NAME[] =         UNICODE_LITERAL_4(N,a,m,e);
1572 const XMLCh Attribute::NAMEFORMAT_ATTRIB_NAME[] =   UNICODE_LITERAL_10(N,a,m,e,F,o,r,m,a,t);
1573 const XMLCh Attribute::FRIENDLYNAME_ATTRIB_NAME[] = UNICODE_LITERAL_12(F,r,i,e,n,d,l,y,N,a,m,e);
1574 const XMLCh AttributeStatement::LOCAL_NAME[] =      UNICODE_LITERAL_18(A,t,t,r,i,b,u,t,e,S,t,a,t,e,m,e,n,t);
1575 const XMLCh AttributeStatement::TYPE_NAME[] =       UNICODE_LITERAL_22(A,t,t,r,i,b,u,t,e,S,t,a,t,e,m,e,n,t,T,y,p,e);
1576 const XMLCh AttributeValue::LOCAL_NAME[] =          UNICODE_LITERAL_14(A,t,t,r,i,b,u,t,e,V,a,l,u,e);
1577 const XMLCh Audience::LOCAL_NAME[] =                UNICODE_LITERAL_8(A,u,d,i,e,n,c,e);
1578 const XMLCh AudienceRestriction::LOCAL_NAME[] =     UNICODE_LITERAL_19(A,u,d,i,e,n,c,e,R,e,s,t,r,i,c,t,i,o,n);
1579 const XMLCh AudienceRestriction::TYPE_NAME[] =      UNICODE_LITERAL_23(A,u,d,i,e,n,c,e,R,e,s,t,r,i,c,t,i,o,n,T,y,p,e);
1580 const XMLCh AuthenticatingAuthority::LOCAL_NAME[] = UNICODE_LITERAL_23(A,u,t,h,e,n,t,i,c,a,t,i,n,g,A,u,t,h,o,r,i,t,y);
1581 const XMLCh AuthnContext::LOCAL_NAME[] =            UNICODE_LITERAL_12(A,u,t,h,n,C,o,n,t,e,x,t);
1582 const XMLCh AuthnContext::TYPE_NAME[] =             UNICODE_LITERAL_16(A,u,t,h,n,C,o,n,t,e,x,t,T,y,p,e);
1583 const XMLCh AuthnContextClassRef::LOCAL_NAME[] =    UNICODE_LITERAL_20(A,u,t,h,n,C,o,n,t,e,x,t,C,l,a,s,s,R,e,f);
1584 const XMLCh AuthnContextDecl::LOCAL_NAME[] =        UNICODE_LITERAL_16(A,u,t,h,n,C,o,n,t,e,x,t,D,e,c,l);
1585 const XMLCh AuthnContextDeclRef::LOCAL_NAME[] =     UNICODE_LITERAL_19(A,u,t,h,n,C,o,n,t,e,x,t,D,e,c,l,R,e,f);
1586 const XMLCh AuthnStatement::LOCAL_NAME[] =          UNICODE_LITERAL_14(A,u,t,h,n,S,t,a,t,e,m,e,n,t);
1587 const XMLCh AuthnStatement::TYPE_NAME[] =           UNICODE_LITERAL_18(A,u,t,h,n,S,t,a,t,e,m,e,n,t,T,y,p,e);
1588 const XMLCh AuthnStatement::AUTHNINSTANT_ATTRIB_NAME[] =    UNICODE_LITERAL_12(A,u,t,h,n,I,n,s,t,a,n,t);
1589 const XMLCh AuthnStatement::SESSIONINDEX_ATTRIB_NAME[] =    UNICODE_LITERAL_12(S,e,s,s,i,o,n,I,n,d,e,x);
1590 const XMLCh AuthnStatement::SESSIONNOTONORAFTER_ATTRIB_NAME[] = UNICODE_LITERAL_19(S,e,s,s,i,o,n,N,o,t,O,n,O,r,A,f,t,e,r);
1591 const XMLCh AuthzDecisionStatement::LOCAL_NAME[] =  UNICODE_LITERAL_22(A,u,t,h,z,D,e,c,i,s,i,o,n,S,t,a,t,e,m,e,n,t);
1592 const XMLCh AuthzDecisionStatement::TYPE_NAME[] =   UNICODE_LITERAL_26(A,u,t,h,z,D,e,c,i,s,i,o,n,S,t,a,t,e,m,e,n,t,T,y,p,e);
1593 const XMLCh AuthzDecisionStatement::RESOURCE_ATTRIB_NAME[] =    UNICODE_LITERAL_8(R,e,s,o,u,r,c,e);
1594 const XMLCh AuthzDecisionStatement::DECISION_ATTRIB_NAME[] =    UNICODE_LITERAL_8(D,e,c,i,s,i,o,n);
1595 const XMLCh AuthzDecisionStatement::DECISION_PERMIT[] = UNICODE_LITERAL_6(P,e,r,m,i,t);
1596 const XMLCh AuthzDecisionStatement::DECISION_DENY[] =   UNICODE_LITERAL_4(D,e,n,y);
1597 const XMLCh AuthzDecisionStatement::DECISION_INDETERMINATE[] =  UNICODE_LITERAL_13(I,n,d,e,t,e,r,m,i,n,a,t,e);
1598 const XMLCh BaseID::LOCAL_NAME[] =                  UNICODE_LITERAL_6(B,a,s,e,I,D);
1599 const XMLCh BaseID::NAMEQUALIFIER_ATTRIB_NAME[] =   UNICODE_LITERAL_13(N,a,m,e,Q,u,a,l,i,f,i,e,r);
1600 const XMLCh BaseID::SPNAMEQUALIFIER_ATTRIB_NAME[] = UNICODE_LITERAL_15(S,P,N,a,m,e,Q,u,a,l,i,f,i,e,r);
1601 const XMLCh Condition::LOCAL_NAME[] =               UNICODE_LITERAL_9(C,o,n,d,i,t,i,o,n);
1602 const XMLCh Conditions::LOCAL_NAME[] =              UNICODE_LITERAL_10(C,o,n,d,i,t,i,o,n,s);
1603 const XMLCh Conditions::TYPE_NAME[] =               UNICODE_LITERAL_14(C,o,n,d,i,t,i,o,n,s,T,y,p,e);
1604 const XMLCh Conditions::NOTBEFORE_ATTRIB_NAME[] =   UNICODE_LITERAL_9(N,o,t,B,e,f,o,r,e);
1605 const XMLCh Conditions::NOTONORAFTER_ATTRIB_NAME[] =UNICODE_LITERAL_12(N,o,t,O,n,O,r,A,f,t,e,r);
1606 const XMLCh EncryptedAssertion::LOCAL_NAME[] =      UNICODE_LITERAL_18(E,n,c,r,y,p,t,e,d,A,s,s,e,r,t,i,o,n);
1607 const XMLCh EncryptedAttribute::LOCAL_NAME[] =      UNICODE_LITERAL_18(E,n,c,r,y,p,t,e,d,A,t,t,r,i,b,u,t,e);
1608 const XMLCh EncryptedElementType::LOCAL_NAME[] =    {chNull};
1609 const XMLCh EncryptedElementType::TYPE_NAME[] =     UNICODE_LITERAL_20(E,n,c,r,y,p,t,e,d,E,l,e,m,e,n,t,T,y,p,e);
1610 const XMLCh EncryptedID::LOCAL_NAME[] =             UNICODE_LITERAL_11(E,n,c,r,y,p,t,e,d,I,d);
1611 const XMLCh Evidence::LOCAL_NAME[] =                UNICODE_LITERAL_8(E,v,i,d,e,n,c,e);
1612 const XMLCh Evidence::TYPE_NAME[] =                 UNICODE_LITERAL_12(E,v,i,d,e,n,c,e,T,y,p,e);
1613 const XMLCh Issuer::LOCAL_NAME[] =                  UNICODE_LITERAL_6(I,s,s,u,e,r);
1614 const XMLCh KeyInfoConfirmationDataType::LOCAL_NAME[] = UNICODE_LITERAL_23(S,u,b,j,e,c,t,C,o,n,f,i,r,m,a,t,i,o,n,D,a,t,a);
1615 const XMLCh KeyInfoConfirmationDataType::TYPE_NAME[] = UNICODE_LITERAL_27(K,e,y,I,n,f,o,C,o,n,f,i,r,m,a,t,i,o,n,D,a,t,a,T,y,p,e);
1616 const XMLCh KeyInfoConfirmationDataType::NOTBEFORE_ATTRIB_NAME[] =      UNICODE_LITERAL_9(N,o,t,B,e,f,o,r,e);
1617 const XMLCh KeyInfoConfirmationDataType::NOTONORAFTER_ATTRIB_NAME[] =   UNICODE_LITERAL_12(N,o,t,O,n,O,r,A,f,t,e,r);
1618 const XMLCh KeyInfoConfirmationDataType::INRESPONSETO_ATTRIB_NAME[] =   UNICODE_LITERAL_12(I,n,R,e,s,p,o,n,s,e,T,o);
1619 const XMLCh KeyInfoConfirmationDataType::RECIPIENT_ATTRIB_NAME[] =      UNICODE_LITERAL_9(R,e,c,i,p,i,e,n,t);
1620 const XMLCh KeyInfoConfirmationDataType::ADDRESS_ATTRIB_NAME[] =        UNICODE_LITERAL_7(A,d,d,r,e,s,s);
1621 const XMLCh NameID::LOCAL_NAME[] =                  UNICODE_LITERAL_6(N,a,m,e,I,D);
1622 const XMLCh NameIDType::LOCAL_NAME[] =              {chNull};
1623 const XMLCh NameIDType::TYPE_NAME[] =               UNICODE_LITERAL_10(N,a,m,e,I,D,T,y,p,e);
1624 const XMLCh NameIDType::NAMEQUALIFIER_ATTRIB_NAME[] =   UNICODE_LITERAL_13(N,a,m,e,Q,u,a,l,i,f,i,e,r);
1625 const XMLCh NameIDType::SPNAMEQUALIFIER_ATTRIB_NAME[] = UNICODE_LITERAL_15(S,P,N,a,m,e,Q,u,a,l,i,f,i,e,r);
1626 const XMLCh NameIDType::FORMAT_ATTRIB_NAME[] =      UNICODE_LITERAL_6(F,o,r,m,a,t);
1627 const XMLCh NameIDType::SPPROVIDEDID_ATTRIB_NAME[] =    UNICODE_LITERAL_12(S,P,P,r,o,v,i,d,e,d,I,D);
1628 const XMLCh OneTimeUse::LOCAL_NAME[] =              UNICODE_LITERAL_10(O,n,e,T,i,m,e,U,s,e);
1629 const XMLCh OneTimeUse::TYPE_NAME[] =               UNICODE_LITERAL_14(O,n,e,T,i,m,e,U,s,e,T,y,p,e);
1630 const XMLCh ProxyRestriction::LOCAL_NAME[] =        UNICODE_LITERAL_16(P,r,o,x,y,R,e,s,t,r,i,c,t,i,o,n);
1631 const XMLCh ProxyRestriction::TYPE_NAME[] =         UNICODE_LITERAL_20(P,r,o,x,y,R,e,s,t,r,i,c,t,i,o,n,T,y,p,e);
1632 const XMLCh ProxyRestriction::COUNT_ATTRIB_NAME[] = UNICODE_LITERAL_5(C,o,u,n,t);
1633 const XMLCh Statement::LOCAL_NAME[] =               UNICODE_LITERAL_9(S,t,a,t,e,m,e,n,t);
1634 const XMLCh Subject::LOCAL_NAME[] =                 UNICODE_LITERAL_7(S,u,b,j,e,c,t);
1635 const XMLCh Subject::TYPE_NAME[] =                  UNICODE_LITERAL_11(S,u,b,j,e,c,t,T,y,p,e);
1636 const XMLCh SubjectConfirmation::LOCAL_NAME[] =     UNICODE_LITERAL_19(S,u,b,j,e,c,t,C,o,n,f,i,r,m,a,t,i,o,n);
1637 const XMLCh SubjectConfirmation::TYPE_NAME[] =      UNICODE_LITERAL_23(S,u,b,j,e,c,t,C,o,n,f,i,r,m,a,t,i,o,n,T,y,p,e);
1638 const XMLCh SubjectConfirmation::METHOD_ATTRIB_NAME[] = UNICODE_LITERAL_6(M,e,t,h,o,d);
1639 const XMLCh SubjectConfirmationData::LOCAL_NAME[] = UNICODE_LITERAL_23(S,u,b,j,e,c,t,C,o,n,f,i,r,m,a,t,i,o,n,D,a,t,a);
1640 const XMLCh SubjectConfirmationData::NOTBEFORE_ATTRIB_NAME[] =      UNICODE_LITERAL_9(N,o,t,B,e,f,o,r,e);
1641 const XMLCh SubjectConfirmationData::NOTONORAFTER_ATTRIB_NAME[] =   UNICODE_LITERAL_12(N,o,t,O,n,O,r,A,f,t,e,r);
1642 const XMLCh SubjectConfirmationData::INRESPONSETO_ATTRIB_NAME[] =   UNICODE_LITERAL_12(I,n,R,e,s,p,o,n,s,e,T,o);
1643 const XMLCh SubjectConfirmationData::RECIPIENT_ATTRIB_NAME[] =      UNICODE_LITERAL_9(R,e,c,i,p,i,e,n,t);
1644 const XMLCh SubjectConfirmationData::ADDRESS_ATTRIB_NAME[] =        UNICODE_LITERAL_7(A,d,d,r,e,s,s);
1645 const XMLCh SubjectLocality::LOCAL_NAME[] =         UNICODE_LITERAL_15(S,u,b,j,e,c,t,L,o,c,a,l,i,t,y);
1646 const XMLCh SubjectLocality::TYPE_NAME[] =          UNICODE_LITERAL_19(S,u,b,j,e,c,t,L,o,c,a,l,i,t,y,T,y,p,e);
1647 const XMLCh SubjectLocality::ADDRESS_ATTRIB_NAME[] =UNICODE_LITERAL_7(A,d,d,r,e,s,s);
1648 const XMLCh SubjectLocality::DNSNAME_ATTRIB_NAME[] =UNICODE_LITERAL_7(D,N,S,N,a,m,e);