+
/*
* Copyright 2001-2006 Internet2
*
#include "internal.h"
#include "exceptions.h"
-#include "SAMLArtifact.h"
#include "SAMLConfig.h"
+#include "binding/SAMLArtifact.h"
#include "saml1/core/Assertions.h"
#include "saml1/core/Protocols.h"
#include "saml2/core/Protocols.h"
#include "saml2/metadata/Metadata.h"
#include "saml2/metadata/MetadataProvider.h"
+#include "security/TrustEngine.h"
#include "util/SAMLConstants.h"
#include <xmltooling/XMLToolingConfig.h>
#include <xsec/enc/XSECCryptoException.hpp>
#include <xsec/enc/XSECCryptoProvider.hpp>
#include <xsec/utils/XSECPlatformUtils.hpp>
-
+#include <openssl/err.h>
using namespace opensaml;
using namespace xmlsignature;
using namespace log4cpp;
using namespace std;
+// Expose entry points when used as an extension library
+
+extern "C" int SAML_API xmltooling_extension_init(void*)
+{
+ if (SAMLConfig::getConfig().init(false))
+ return 0;
+ return -1;
+}
+
+extern "C" void SAML_API xmltooling_extension_term()
+{
+ SAMLConfig::getConfig().term(false);
+}
+
DECL_EXCEPTION_FACTORY(ArtifactException,opensaml);
DECL_EXCEPTION_FACTORY(MetadataFilterException,opensaml::saml2md);
return g_config;
}
-bool SAMLInternalConfig::init()
+bool SAMLInternalConfig::init(bool initXMLTooling)
{
#ifdef _DEBUG
xmltooling::NDC ndc("init");
Category& log=Category::getInstance(SAML_LOGCAT".SAMLConfig");
log.debug("library initialization started");
- XMLToolingConfig::getConfig().init();
- log.debug("XMLTooling library initialized");
+ if (initXMLTooling) {
+ XMLToolingConfig::getConfig().init();
+ log.debug("XMLTooling library initialized");
+ }
REGISTER_EXCEPTION_FACTORY(ArtifactException,opensaml);
REGISTER_EXCEPTION_FACTORY(MetadataFilterException,opensaml::saml2md);
saml2md::registerMetadataClasses();
saml2md::registerMetadataProviders();
saml2md::registerMetadataFilters();
+ registerTrustEngines();
log.info("library initialization complete");
return true;
}
-void SAMLInternalConfig::term()
+void SAMLInternalConfig::term(bool termXMLTooling)
{
#ifdef _DEBUG
xmltooling::NDC ndc("term");
#endif
+ Category& log=Category::getInstance(SAML_LOGCAT".SAMLConfig");
saml1::AssertionSchemaValidators.destroyValidators();
saml1p::ProtocolSchemaValidators.destroyValidators();
SAMLArtifactManager.deregisterFactories();
MetadataFilterManager.deregisterFactories();
MetadataProviderManager.deregisterFactories();
+ TrustEngineManager.deregisterFactories();
- XMLToolingConfig::getConfig().term();
- Category::getInstance(SAML_LOGCAT".SAMLConfig").info("library shutdown complete");
+ if (termXMLTooling) {
+ XMLToolingConfig::getConfig().term();
+ log.debug("XMLTooling library shut down");
+ }
+ log.info("library shutdown complete");
}
void SAMLInternalConfig::generateRandomBytes(void* buf, unsigned int len)
}
throw XMLSecurityException("Unable to generate SHA-1 hash.");
}
+
+void opensaml::log_openssl()
+{
+ const char* file;
+ const char* data;
+ int flags,line;
+
+ unsigned long code=ERR_get_error_line_data(&file,&line,&data,&flags);
+ while (code) {
+ Category& log=Category::getInstance("OpenSSL");
+ log.errorStream() << "error code: " << code << " in " << file << ", line " << line << CategoryStream::ENDLINE;
+ if (data && (flags & ERR_TXT_STRING))
+ log.errorStream() << "error data: " << data << CategoryStream::ENDLINE;
+ code=ERR_get_error_line_data(&file,&line,&data,&flags);
+ }
+}