2 * Copyright 2001-2006 Internet2
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
18 * Assertions20Impl.cpp
20 * Implementation classes for SAML 2.0 Assertions schema
24 #include "exceptions.h"
25 #include "saml/encryption/EncryptedKeyResolver.h"
26 #include "saml2/core/Assertions.h"
28 #include <xmltooling/AbstractChildlessElement.h>
29 #include <xmltooling/AbstractComplexElement.h>
30 #include <xmltooling/AbstractElementProxy.h>
31 #include <xmltooling/AbstractSimpleElement.h>
32 #include <xmltooling/encryption/Decrypter.h>
33 #include <xmltooling/impl/AnyElement.h>
34 #include <xmltooling/io/AbstractXMLObjectMarshaller.h>
35 #include <xmltooling/io/AbstractXMLObjectUnmarshaller.h>
36 #include <xmltooling/util/XMLHelper.h>
39 #include <xercesc/util/XMLUniDefs.hpp>
41 using namespace opensaml::saml2;
42 using namespace opensaml;
43 using namespace xmlencryption;
44 using namespace xmlsignature;
45 using namespace xmltooling;
48 #if defined (_MSC_VER)
49 #pragma warning( push )
50 #pragma warning( disable : 4250 4251 )
56 DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,AssertionIDRef);
57 DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,AssertionURIRef);
58 DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,Audience);
59 DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,AuthnContextClassRef);
60 DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,AuthnContextDeclRef);
61 DECL_XMLOBJECTIMPL_SIMPLE(SAML_DLLLOCAL,AuthenticatingAuthority);
63 class SAML_DLLLOCAL NameIDTypeImpl : public virtual NameIDType,
64 public AbstractSimpleElement,
65 public AbstractChildlessElement,
66 public AbstractDOMCachingXMLObject,
67 public AbstractXMLObjectMarshaller,
68 public AbstractXMLObjectUnmarshaller
71 m_Format=m_SPProvidedID=m_NameQualifier=m_SPNameQualifier=NULL;
80 virtual ~NameIDTypeImpl() {
81 XMLString::release(&m_NameQualifier);
82 XMLString::release(&m_SPNameQualifier);
83 XMLString::release(&m_Format);
84 XMLString::release(&m_SPProvidedID);
87 NameIDTypeImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
88 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
92 NameIDTypeImpl(const NameIDTypeImpl& src)
93 : AbstractXMLObject(src), AbstractSimpleElement(src), AbstractDOMCachingXMLObject(src) {
95 setNameQualifier(src.getNameQualifier());
96 setSPNameQualifier(src.getSPNameQualifier());
97 setFormat(src.getFormat());
98 setSPProvidedID(src.getSPProvidedID());
101 IMPL_XMLOBJECT_CLONE(NameIDType);
102 IMPL_STRING_ATTRIB(NameQualifier);
103 IMPL_STRING_ATTRIB(SPNameQualifier);
104 IMPL_STRING_ATTRIB(Format);
105 IMPL_STRING_ATTRIB(SPProvidedID);
106 IMPL_XMLOBJECT_CONTENT;
109 void marshallAttributes(DOMElement* domElement) const {
110 MARSHALL_STRING_ATTRIB(NameQualifier,NAMEQUALIFIER,NULL);
111 MARSHALL_STRING_ATTRIB(SPNameQualifier,SPNAMEQUALIFIER,NULL);
112 MARSHALL_STRING_ATTRIB(Format,FORMAT,NULL);
113 MARSHALL_STRING_ATTRIB(SPProvidedID,SPPROVIDEDID,NULL);
116 void processAttribute(const DOMAttr* attribute) {
117 PROC_STRING_ATTRIB(NameQualifier,NAMEQUALIFIER,NULL);
118 PROC_STRING_ATTRIB(SPNameQualifier,SPNAMEQUALIFIER,NULL);
119 PROC_STRING_ATTRIB(Format,FORMAT,NULL);
120 PROC_STRING_ATTRIB(SPProvidedID,SPPROVIDEDID,NULL);
121 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
125 class SAML_DLLLOCAL NameIDImpl : public virtual NameID, public NameIDTypeImpl
128 virtual ~NameIDImpl() {}
130 NameIDImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
131 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {}
133 NameIDImpl(const NameIDImpl& src) : AbstractXMLObject(src), NameIDTypeImpl(src) {}
135 IMPL_XMLOBJECT_CLONE(NameID);
136 NameIDType* cloneNameIDType() const {
137 return new NameIDImpl(*this);
141 class SAML_DLLLOCAL IssuerImpl : public virtual Issuer, public NameIDTypeImpl
144 virtual ~IssuerImpl() {}
146 IssuerImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
147 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {}
149 IssuerImpl(const IssuerImpl& src) : AbstractXMLObject(src), NameIDTypeImpl(src) {}
151 IMPL_XMLOBJECT_CLONE(Issuer);
152 NameIDType* cloneNameIDType() const {
153 return new IssuerImpl(*this);
157 class SAML_DLLLOCAL EncryptedElementTypeImpl : public virtual EncryptedElementType,
158 public AbstractComplexElement,
159 public AbstractDOMCachingXMLObject,
160 public AbstractXMLObjectMarshaller,
161 public AbstractXMLObjectUnmarshaller
164 m_EncryptedData=NULL;
165 m_children.push_back(NULL);
166 m_pos_EncryptedData=m_children.begin();
170 EncryptedElementTypeImpl() {
175 virtual ~EncryptedElementTypeImpl() {}
177 EncryptedElementTypeImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
178 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
182 EncryptedElementTypeImpl(const EncryptedElementTypeImpl& src)
183 : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
185 if (src.getEncryptedData())
186 setEncryptedData(src.getEncryptedData()->cloneEncryptedData());
187 VectorOf(EncryptedKey) v=getEncryptedKeys();
188 for (vector<EncryptedKey*>::const_iterator i=src.m_EncryptedKeys.begin(); i!=src.m_EncryptedKeys.end(); i++) {
190 v.push_back((*i)->cloneEncryptedKey());
195 XMLObject* decrypt(KeyResolver* KEKresolver, const XMLCh* recipient) const
197 if (!m_EncryptedData)
198 throw DecryptionException("No encrypted data present.");
199 Decrypter decrypter(KEKresolver, new EncryptedKeyResolver(*this, recipient));
200 DOMDocumentFragment* frag = decrypter.decryptData(m_EncryptedData);
201 if (frag->hasChildNodes() && frag->getFirstChild()==frag->getLastChild()) {
202 DOMNode* plaintext=frag->getFirstChild();
203 if (plaintext->getNodeType()==DOMNode::ELEMENT_NODE) {
204 auto_ptr<XMLObject> ret(XMLObjectBuilder::buildOneFromElement(static_cast<DOMElement*>(plaintext)));
205 ret->releaseThisAndChildrenDOM();
206 return ret.release();
210 throw DecryptionException("Decryption did not result in a single element.");
213 IMPL_XMLOBJECT_CLONE(EncryptedElementType);
214 IMPL_TYPED_FOREIGN_CHILD(EncryptedData,xmlencryption);
215 IMPL_TYPED_FOREIGN_CHILDREN(EncryptedKey,xmlencryption,m_children.end());
218 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
219 PROC_TYPED_FOREIGN_CHILD(EncryptedData,xmlencryption,XMLConstants::XMLENC_NS,false);
220 PROC_TYPED_FOREIGN_CHILDREN(EncryptedKey,xmlencryption,XMLConstants::XMLENC_NS,false);
221 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
225 class SAML_DLLLOCAL EncryptedIDImpl : public virtual EncryptedID, public EncryptedElementTypeImpl
228 virtual ~EncryptedIDImpl() {}
230 EncryptedIDImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
231 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {}
233 EncryptedIDImpl(const EncryptedIDImpl& src) : AbstractXMLObject(src), EncryptedElementTypeImpl(src) {}
235 IMPL_XMLOBJECT_CLONE(EncryptedID);
236 EncryptedElementType* cloneEncryptedElementType() const {
237 return new EncryptedIDImpl(*this);
241 class SAML_DLLLOCAL AudienceRestrictionImpl : public virtual AudienceRestriction,
242 public AbstractComplexElement,
243 public AbstractDOMCachingXMLObject,
244 public AbstractXMLObjectMarshaller,
245 public AbstractXMLObjectUnmarshaller
248 virtual ~AudienceRestrictionImpl() {}
250 AudienceRestrictionImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
251 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
254 AudienceRestrictionImpl(const AudienceRestrictionImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
255 VectorOf(Audience) v=getAudiences();
256 for (vector<Audience*>::const_iterator i=src.m_Audiences.begin(); i!=src.m_Audiences.end(); i++) {
258 v.push_back((*i)->cloneAudience());
263 IMPL_XMLOBJECT_CLONE(AudienceRestriction);
264 Condition* cloneCondition() const {
265 return cloneAudienceRestriction();
267 IMPL_TYPED_CHILDREN(Audience,m_children.end());
270 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
271 PROC_TYPED_CHILDREN(Audience,SAMLConstants::SAML20_NS,false);
272 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
276 class SAML_DLLLOCAL OneTimeUseImpl : public virtual OneTimeUse,
277 public AbstractChildlessElement,
278 public AbstractDOMCachingXMLObject,
279 public AbstractXMLObjectMarshaller,
280 public AbstractXMLObjectUnmarshaller
283 virtual ~OneTimeUseImpl() {}
285 OneTimeUseImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
286 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
289 OneTimeUseImpl(const OneTimeUseImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
292 IMPL_XMLOBJECT_CLONE(OneTimeUse);
293 Condition* cloneCondition() const {
294 return cloneOneTimeUse();
298 class SAML_DLLLOCAL ProxyRestrictionImpl : public virtual ProxyRestriction,
299 public AbstractComplexElement,
300 public AbstractDOMCachingXMLObject,
301 public AbstractXMLObjectMarshaller,
302 public AbstractXMLObjectUnmarshaller
305 virtual ~ProxyRestrictionImpl() {
306 XMLString::release(&m_Count);
309 ProxyRestrictionImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
310 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
314 ProxyRestrictionImpl(const ProxyRestrictionImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
315 setCount(src.m_Count);
316 VectorOf(Audience) v=getAudiences();
317 for (vector<Audience*>::const_iterator i=src.m_Audiences.begin(); i!=src.m_Audiences.end(); i++) {
319 v.push_back((*i)->cloneAudience());
324 IMPL_XMLOBJECT_CLONE(ProxyRestriction);
325 Condition* cloneCondition() const {
326 return cloneProxyRestriction();
328 IMPL_TYPED_CHILDREN(Audience,m_children.end());
329 IMPL_INTEGER_ATTRIB(Count);
332 void marshallAttributes(DOMElement* domElement) const {
333 MARSHALL_INTEGER_ATTRIB(Count,COUNT,NULL);
336 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
337 PROC_TYPED_CHILDREN(Audience,SAMLConstants::SAML20_NS,false);
338 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
341 void processAttribute(const DOMAttr* attribute) {
342 PROC_INTEGER_ATTRIB(Count,COUNT,NULL);
343 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
348 class SAML_DLLLOCAL ConditionsImpl : public virtual Conditions,
349 public AbstractComplexElement,
350 public AbstractDOMCachingXMLObject,
351 public AbstractXMLObjectMarshaller,
352 public AbstractXMLObjectUnmarshaller
355 m_NotBefore=m_NotOnOrAfter=NULL;
358 virtual ~ConditionsImpl() {
360 delete m_NotOnOrAfter;
363 ConditionsImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
364 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
368 ConditionsImpl(const ConditionsImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
370 setNotBefore(src.getNotBefore());
371 setNotOnOrAfter(src.getNotOnOrAfter());
373 for (list<XMLObject*>::const_iterator i=src.m_children.begin(); i!=src.m_children.end(); i++) {
375 AudienceRestriction* arc=dynamic_cast<AudienceRestriction*>(*i);
377 getAudienceRestrictions().push_back(arc->cloneAudienceRestriction());
381 OneTimeUse* dncc=dynamic_cast<OneTimeUse*>(*i);
383 getOneTimeUses().push_back(dncc->cloneOneTimeUse());
387 ProxyRestriction* prc=dynamic_cast<ProxyRestriction*>(*i);
389 getProxyRestrictions().push_back(prc->cloneProxyRestriction());
393 Condition* c=dynamic_cast<Condition*>(*i);
395 getConditions().push_back(c->cloneCondition());
402 IMPL_XMLOBJECT_CLONE(Conditions);
403 IMPL_DATETIME_ATTRIB(NotBefore,0);
404 IMPL_DATETIME_ATTRIB(NotOnOrAfter,LLONG_MAX);
405 IMPL_TYPED_CHILDREN(AudienceRestriction, m_children.end());
406 IMPL_TYPED_CHILDREN(OneTimeUse,m_children.end());
407 IMPL_TYPED_CHILDREN(ProxyRestriction, m_children.end());
408 IMPL_TYPED_CHILDREN(Condition,m_children.end());
411 void marshallAttributes(DOMElement* domElement) const {
412 MARSHALL_DATETIME_ATTRIB(NotBefore,NOTBEFORE,NULL);
413 MARSHALL_DATETIME_ATTRIB(NotOnOrAfter,NOTONORAFTER,NULL);
416 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
417 PROC_TYPED_CHILDREN(AudienceRestriction,SAMLConstants::SAML20_NS,false);
418 PROC_TYPED_CHILDREN(OneTimeUse,SAMLConstants::SAML20_NS,false);
419 PROC_TYPED_CHILDREN(ProxyRestriction,SAMLConstants::SAML20_NS,false);
420 PROC_TYPED_CHILDREN(Condition,SAMLConstants::SAML20_NS,false);
421 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
424 void processAttribute(const DOMAttr* attribute) {
425 PROC_DATETIME_ATTRIB(NotBefore,NOTBEFORE,NULL);
426 PROC_DATETIME_ATTRIB(NotOnOrAfter,NOTONORAFTER,NULL);
427 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
431 class SAML_DLLLOCAL SubjectConfirmationDataImpl : public virtual SubjectConfirmationData, public AnyElementImpl
434 m_NotBefore=m_NotOnOrAfter=NULL;
435 m_Recipient=m_InResponseTo=m_Address=NULL;
438 virtual ~SubjectConfirmationDataImpl() {
440 delete m_NotOnOrAfter;
441 XMLString::release(&m_Recipient);
442 XMLString::release(&m_InResponseTo);
443 XMLString::release(&m_Address);
446 SubjectConfirmationDataImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
447 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
451 SubjectConfirmationDataImpl(const SubjectConfirmationDataImpl& src) : AnyElementImpl(src) {
453 setNotBefore(src.getNotBefore());
454 setNotOnOrAfter(src.getNotOnOrAfter());
455 setRecipient(src.getRecipient());
456 setInResponseTo(src.getInResponseTo());
457 setAddress(src.getAddress());
460 IMPL_XMLOBJECT_CLONE(SubjectConfirmationData);
461 IMPL_DATETIME_ATTRIB(NotBefore,0);
462 IMPL_DATETIME_ATTRIB(NotOnOrAfter,LLONG_MAX);
463 IMPL_STRING_ATTRIB(Recipient);
464 IMPL_STRING_ATTRIB(InResponseTo);
465 IMPL_STRING_ATTRIB(Address);
468 void setAttribute(QName& qualifiedName, const XMLCh* value) {
469 if (!qualifiedName.hasNamespaceURI()) {
470 if (XMLString::equals(qualifiedName.getLocalPart(),NOTBEFORE_ATTRIB_NAME)) {
474 else if (XMLString::equals(qualifiedName.getLocalPart(),NOTONORAFTER_ATTRIB_NAME)) {
475 setNotOnOrAfter(value);
478 else if (XMLString::equals(qualifiedName.getLocalPart(),RECIPIENT_ATTRIB_NAME)) {
482 else if (XMLString::equals(qualifiedName.getLocalPart(),INRESPONSETO_ATTRIB_NAME)) {
483 setInResponseTo(value);
486 else if (XMLString::equals(qualifiedName.getLocalPart(),ADDRESS_ATTRIB_NAME)) {
491 AbstractAttributeExtensibleXMLObject::setAttribute(qualifiedName, value);
495 void marshallAttributes(DOMElement* domElement) const {
496 MARSHALL_DATETIME_ATTRIB(NotBefore,NOTBEFORE,NULL);
497 MARSHALL_DATETIME_ATTRIB(NotOnOrAfter,NOTONORAFTER,NULL);
498 MARSHALL_STRING_ATTRIB(Recipient,RECIPIENT,NULL);
499 MARSHALL_STRING_ATTRIB(InResponseTo,INRESPONSETO,NULL);
500 MARSHALL_STRING_ATTRIB(Address,ADDRESS,NULL);
501 AnyElementImpl::marshallAttributes(domElement);
504 // The processAttributes hook is handled by AnyElementImpl
507 class SAML_DLLLOCAL KeyInfoConfirmationDataTypeImpl : public virtual KeyInfoConfirmationDataType,
508 public AbstractComplexElement,
509 public AbstractAttributeExtensibleXMLObject,
510 public AbstractDOMCachingXMLObject,
511 public AbstractXMLObjectMarshaller,
512 public AbstractXMLObjectUnmarshaller
515 m_NotBefore=m_NotOnOrAfter=NULL;
516 m_Recipient=m_InResponseTo=m_Address=NULL;
519 virtual ~KeyInfoConfirmationDataTypeImpl() {
521 delete m_NotOnOrAfter;
522 XMLString::release(&m_Recipient);
523 XMLString::release(&m_InResponseTo);
524 XMLString::release(&m_Address);
527 KeyInfoConfirmationDataTypeImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
528 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
532 KeyInfoConfirmationDataTypeImpl(const KeyInfoConfirmationDataTypeImpl& src)
533 : AbstractXMLObject(src), AbstractAttributeExtensibleXMLObject(src), AbstractDOMCachingXMLObject(src) {
535 setNotBefore(src.getNotBefore());
536 setNotOnOrAfter(src.getNotOnOrAfter());
537 setRecipient(src.getRecipient());
538 setInResponseTo(src.getInResponseTo());
539 setAddress(src.getAddress());
540 VectorOf(KeyInfo) v=getKeyInfos();
541 for (vector<KeyInfo*>::const_iterator i=src.m_KeyInfos.begin(); i!=src.m_KeyInfos.end(); i++) {
543 v.push_back((*i)->cloneKeyInfo());
548 IMPL_XMLOBJECT_CLONE(KeyInfoConfirmationDataType);
549 IMPL_DATETIME_ATTRIB(NotBefore,0);
550 IMPL_DATETIME_ATTRIB(NotOnOrAfter,LLONG_MAX);
551 IMPL_STRING_ATTRIB(Recipient);
552 IMPL_STRING_ATTRIB(InResponseTo);
553 IMPL_STRING_ATTRIB(Address);
554 IMPL_TYPED_CHILDREN(KeyInfo,m_children.end());
557 void setAttribute(QName& qualifiedName, const XMLCh* value) {
558 if (!qualifiedName.hasNamespaceURI()) {
559 if (XMLString::equals(qualifiedName.getLocalPart(),NOTBEFORE_ATTRIB_NAME)) {
563 else if (XMLString::equals(qualifiedName.getLocalPart(),NOTONORAFTER_ATTRIB_NAME)) {
564 setNotOnOrAfter(value);
567 else if (XMLString::equals(qualifiedName.getLocalPart(),RECIPIENT_ATTRIB_NAME)) {
571 else if (XMLString::equals(qualifiedName.getLocalPart(),INRESPONSETO_ATTRIB_NAME)) {
572 setInResponseTo(value);
575 else if (XMLString::equals(qualifiedName.getLocalPart(),ADDRESS_ATTRIB_NAME)) {
580 AbstractAttributeExtensibleXMLObject::setAttribute(qualifiedName, value);
584 void marshallAttributes(DOMElement* domElement) const {
585 MARSHALL_DATETIME_ATTRIB(NotBefore,NOTBEFORE,NULL);
586 MARSHALL_DATETIME_ATTRIB(NotOnOrAfter,NOTONORAFTER,NULL);
587 MARSHALL_STRING_ATTRIB(Recipient,RECIPIENT,NULL);
588 MARSHALL_STRING_ATTRIB(InResponseTo,INRESPONSETO,NULL);
589 MARSHALL_STRING_ATTRIB(Address,ADDRESS,NULL);
591 // Take care of wildcard.
592 for (map<QName,XMLCh*>::const_iterator i=m_attributeMap.begin(); i!=m_attributeMap.end(); i++) {
593 DOMAttr* attr=domElement->getOwnerDocument()->createAttributeNS(i->first.getNamespaceURI(),i->first.getLocalPart());
594 if (i->first.hasPrefix())
595 attr->setPrefix(i->first.getPrefix());
596 attr->setNodeValue(i->second);
597 domElement->setAttributeNode(attr);
601 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
602 PROC_TYPED_CHILDREN(KeyInfo,XMLConstants::XMLSIG_NS,false);
603 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
606 void processAttribute(const DOMAttr* attribute) {
607 QName q(attribute->getNamespaceURI(),attribute->getLocalName(),attribute->getPrefix());
608 setAttribute(q,attribute->getNodeValue());
612 class SAML_DLLLOCAL SubjectConfirmationImpl : public virtual SubjectConfirmation,
613 public AbstractComplexElement,
614 public AbstractDOMCachingXMLObject,
615 public AbstractXMLObjectMarshaller,
616 public AbstractXMLObjectUnmarshaller
623 m_SubjectConfirmationData=NULL;
624 m_KeyInfoConfirmationDataType=NULL;
625 m_children.push_back(NULL);
626 m_children.push_back(NULL);
627 m_children.push_back(NULL);
628 m_children.push_back(NULL);
629 m_pos_BaseID=m_children.begin();
630 m_pos_NameID=m_pos_BaseID;
632 m_pos_EncryptedID=m_pos_NameID;
634 m_pos_SubjectConfirmationData=m_pos_EncryptedID;
635 ++m_pos_SubjectConfirmationData;
636 m_pos_KeyInfoConfirmationDataType=m_pos_SubjectConfirmationData;
637 ++m_pos_KeyInfoConfirmationDataType;
640 virtual ~SubjectConfirmationImpl() {}
642 SubjectConfirmationImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
643 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
647 SubjectConfirmationImpl(const SubjectConfirmationImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
649 setMethod(src.getMethod());
651 setBaseID(src.getBaseID()->cloneBaseID());
653 setNameID(src.getNameID()->cloneNameID());
654 if (src.getEncryptedID())
655 setEncryptedID(src.getEncryptedID()->cloneEncryptedID());
656 if (src.getSubjectConfirmationData())
657 setSubjectConfirmationData(src.getSubjectConfirmationData()->clone());
658 if (src.getKeyInfoConfirmationDataType())
659 setKeyInfoConfirmationDataType(src.getKeyInfoConfirmationDataType()->cloneKeyInfoConfirmationDataType());
662 IMPL_XMLOBJECT_CLONE(SubjectConfirmation);
663 IMPL_STRING_ATTRIB(Method);
664 IMPL_TYPED_CHILD(BaseID);
665 IMPL_TYPED_CHILD(NameID);
666 IMPL_TYPED_CHILD(EncryptedID);
667 IMPL_XMLOBJECT_CHILD(SubjectConfirmationData);
668 IMPL_TYPED_CHILD(KeyInfoConfirmationDataType);
671 void marshallAttributes(DOMElement* domElement) const {
672 MARSHALL_STRING_ATTRIB(Method,METHOD,NULL);
675 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
676 PROC_TYPED_CHILD(BaseID,SAMLConstants::SAML20_NS,false);
677 PROC_TYPED_CHILD(NameID,SAMLConstants::SAML20_NS,false);
678 PROC_TYPED_CHILD(EncryptedID,SAMLConstants::SAML20_NS,false);
679 PROC_XMLOBJECT_CHILD(SubjectConfirmationData,SAMLConstants::SAML20_NS);
680 PROC_TYPED_CHILD(KeyInfoConfirmationDataType,SAMLConstants::SAML20_NS,false);
681 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
684 void processAttribute(const DOMAttr* attribute) {
685 PROC_STRING_ATTRIB(Method,METHOD,NULL);
686 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
690 class SAML_DLLLOCAL SubjectImpl : public virtual Subject,
691 public AbstractComplexElement,
692 public AbstractDOMCachingXMLObject,
693 public AbstractXMLObjectMarshaller,
694 public AbstractXMLObjectUnmarshaller
699 //m_EncryptedID=NULL;
700 m_children.push_back(NULL);
701 m_children.push_back(NULL);
702 m_children.push_back(NULL);
703 m_pos_BaseID=m_children.begin();
704 m_pos_NameID=m_pos_BaseID;
706 m_pos_EncryptedID=m_pos_NameID;
710 virtual ~SubjectImpl() {}
712 SubjectImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
713 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
717 SubjectImpl(const SubjectImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
720 setBaseID(src.getBaseID()->cloneBaseID());
722 setNameID(src.getNameID()->cloneNameID());
723 if (src.getEncryptedID())
724 setEncryptedID(src.getEncryptedID()->cloneEncryptedID());
725 VectorOf(SubjectConfirmation) v=getSubjectConfirmations();
726 for (vector<SubjectConfirmation*>::const_iterator i=src.m_SubjectConfirmations.begin(); i!=src.m_SubjectConfirmations.end(); i++) {
728 v.push_back((*i)->cloneSubjectConfirmation());
733 IMPL_XMLOBJECT_CLONE(Subject);
734 IMPL_TYPED_CHILD(NameID);
735 IMPL_TYPED_CHILD(BaseID);
736 IMPL_TYPED_CHILD(EncryptedID);
737 IMPL_TYPED_CHILDREN(SubjectConfirmation,m_children.end());
740 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
741 PROC_TYPED_CHILD(BaseID,SAMLConstants::SAML20_NS,false);
742 PROC_TYPED_CHILD(NameID,SAMLConstants::SAML20_NS,false);
743 PROC_TYPED_CHILD(EncryptedID,SAMLConstants::SAML20_NS,false);
744 PROC_TYPED_CHILDREN(SubjectConfirmation,SAMLConstants::SAML20_NS,false);
745 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
749 class SAML_DLLLOCAL SubjectLocalityImpl : public virtual SubjectLocality,
750 public AbstractChildlessElement,
751 public AbstractDOMCachingXMLObject,
752 public AbstractXMLObjectMarshaller,
753 public AbstractXMLObjectUnmarshaller
756 m_Address=m_DNSName=NULL;
759 virtual ~SubjectLocalityImpl() {
760 XMLString::release(&m_Address);
761 XMLString::release(&m_DNSName);
764 SubjectLocalityImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
765 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
769 SubjectLocalityImpl(const SubjectLocalityImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
771 setAddress(src.getAddress());
772 setDNSName(src.getDNSName());
775 IMPL_XMLOBJECT_CLONE(SubjectLocality);
776 IMPL_STRING_ATTRIB(Address);
777 IMPL_STRING_ATTRIB(DNSName);
780 void marshallAttributes(DOMElement* domElement) const {
781 MARSHALL_STRING_ATTRIB(Address,ADDRESS,NULL);
782 MARSHALL_STRING_ATTRIB(DNSName,DNSNAME,NULL);
785 void processAttribute(const DOMAttr* attribute) {
786 PROC_STRING_ATTRIB(Address,ADDRESS,NULL);
787 PROC_STRING_ATTRIB(DNSName,DNSNAME,NULL);
788 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
792 class SAML_DLLLOCAL AuthnContextDeclImpl : public virtual AuthnContextDecl, public AnyElementImpl
795 virtual ~AuthnContextDeclImpl() {}
797 AuthnContextDeclImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
798 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
801 AuthnContextDeclImpl(const AuthnContextDeclImpl& src) : AnyElementImpl(src) {
804 IMPL_XMLOBJECT_CLONE(AuthnContextDecl);
807 class SAML_DLLLOCAL AuthnContextImpl : public virtual AuthnContext,
808 public AbstractComplexElement,
809 public AbstractDOMCachingXMLObject,
810 public AbstractXMLObjectMarshaller,
811 public AbstractXMLObjectUnmarshaller
814 m_AuthnContextClassRef=NULL;
815 m_AuthnContextDecl=NULL;
816 m_AuthnContextDeclRef=NULL;
817 m_children.push_back(NULL);
818 m_children.push_back(NULL);
819 m_children.push_back(NULL);
820 m_pos_AuthnContextClassRef=m_children.begin();
821 m_pos_AuthnContextDecl=m_pos_AuthnContextClassRef;
822 ++m_pos_AuthnContextDecl;
823 m_pos_AuthnContextDeclRef=m_pos_AuthnContextDecl;
824 ++m_pos_AuthnContextDeclRef;
827 virtual ~AuthnContextImpl() {}
829 AuthnContextImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
830 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
834 AuthnContextImpl(const AuthnContextImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
836 if (src.getAuthnContextClassRef())
837 setAuthnContextClassRef(src.getAuthnContextClassRef()->cloneAuthnContextClassRef());
838 if (src.getAuthnContextDecl())
839 setAuthnContextDecl(src.getAuthnContextDecl()->clone());
840 if (src.getAuthnContextDeclRef())
841 setAuthnContextDeclRef(src.getAuthnContextDeclRef()->cloneAuthnContextDeclRef());
842 VectorOf(AuthenticatingAuthority) v=getAuthenticatingAuthoritys();
843 for (vector<AuthenticatingAuthority*>::const_iterator i=src.m_AuthenticatingAuthoritys.begin(); i!=src.m_AuthenticatingAuthoritys.end(); i++) {
845 v.push_back((*i)->cloneAuthenticatingAuthority());
850 IMPL_XMLOBJECT_CLONE(AuthnContext);
851 IMPL_TYPED_CHILD(AuthnContextClassRef);
852 IMPL_XMLOBJECT_CHILD(AuthnContextDecl);
853 IMPL_TYPED_CHILD(AuthnContextDeclRef);
854 IMPL_TYPED_CHILDREN(AuthenticatingAuthority,m_children.end());
857 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
858 PROC_TYPED_CHILD(AuthnContextClassRef,SAMLConstants::SAML20_NS,false);
859 PROC_XMLOBJECT_CHILD(AuthnContextDecl,SAMLConstants::SAML20_NS);
860 PROC_TYPED_CHILD(AuthnContextDeclRef,SAMLConstants::SAML20_NS,false);
861 PROC_TYPED_CHILDREN(AuthenticatingAuthority,SAMLConstants::SAML20_NS,false);
862 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
866 class SAML_DLLLOCAL AuthnStatementImpl : public virtual AuthnStatement,
867 public AbstractComplexElement,
868 public AbstractDOMCachingXMLObject,
869 public AbstractXMLObjectMarshaller,
870 public AbstractXMLObjectUnmarshaller
875 m_SessionNotOnOrAfter=NULL;
876 m_SubjectLocality=NULL;
878 m_children.push_back(NULL);
879 m_children.push_back(NULL);
880 m_pos_SubjectLocality=m_children.begin();
881 m_pos_AuthnContext=m_pos_SubjectLocality;
882 ++m_pos_AuthnContext;
885 virtual ~AuthnStatementImpl() {
886 delete m_AuthnInstant;
887 XMLString::release(&m_SessionIndex);
888 delete m_SessionNotOnOrAfter;
891 AuthnStatementImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
892 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
896 AuthnStatementImpl(const AuthnStatementImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
898 setAuthnInstant(src.getAuthnInstant());
899 setSessionIndex(src.getSessionIndex());
900 setSessionNotOnOrAfter(src.getSessionNotOnOrAfter());
901 if (src.getSubjectLocality())
902 setSubjectLocality(src.getSubjectLocality()->cloneSubjectLocality());
903 if (src.getAuthnContext())
904 setAuthnContext(src.getAuthnContext()->cloneAuthnContext());
907 IMPL_XMLOBJECT_CLONE(AuthnStatement);
908 Statement* cloneStatement() const {
909 return cloneAuthnStatement();
911 IMPL_DATETIME_ATTRIB(AuthnInstant,0);
912 IMPL_STRING_ATTRIB(SessionIndex);
913 IMPL_DATETIME_ATTRIB(SessionNotOnOrAfter,LLONG_MAX);
914 IMPL_TYPED_CHILD(SubjectLocality);
915 IMPL_TYPED_CHILD(AuthnContext);
918 void marshallAttributes(DOMElement* domElement) const {
919 MARSHALL_DATETIME_ATTRIB(AuthnInstant,AUTHNINSTANT,NULL);
920 MARSHALL_STRING_ATTRIB(SessionIndex,SESSIONINDEX,NULL);
921 MARSHALL_DATETIME_ATTRIB(SessionNotOnOrAfter,SESSIONNOTONORAFTER,NULL);
924 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
925 PROC_TYPED_CHILD(SubjectLocality,SAMLConstants::SAML20_NS,false);
926 PROC_TYPED_CHILD(AuthnContext,SAMLConstants::SAML20_NS,false);
927 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
930 void processAttribute(const DOMAttr* attribute) {
931 PROC_DATETIME_ATTRIB(AuthnInstant,AUTHNINSTANT,NULL);
932 PROC_STRING_ATTRIB(SessionIndex,SESSIONINDEX,NULL);
933 PROC_DATETIME_ATTRIB(SessionNotOnOrAfter,SESSIONNOTONORAFTER,NULL);
934 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
938 class SAML_DLLLOCAL ActionImpl : public virtual Action,
939 public AbstractSimpleElement,
940 public AbstractChildlessElement,
941 public AbstractDOMCachingXMLObject,
942 public AbstractXMLObjectMarshaller,
943 public AbstractXMLObjectUnmarshaller
946 virtual ~ActionImpl() {
947 XMLString::release(&m_Namespace);
950 ActionImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
951 : AbstractXMLObject(nsURI, localName, prefix, schemaType), m_Namespace(NULL) {
954 ActionImpl(const ActionImpl& src)
955 : AbstractXMLObject(src), AbstractSimpleElement(src), AbstractDOMCachingXMLObject(src) {
956 setNamespace(src.getNamespace());
959 IMPL_XMLOBJECT_CLONE(Action);
960 IMPL_STRING_ATTRIB(Namespace);
961 IMPL_XMLOBJECT_CONTENT;
964 void marshallAttributes(DOMElement* domElement) const {
965 MARSHALL_STRING_ATTRIB(Namespace,NAMESPACE,NULL);
968 void processAttribute(const DOMAttr* attribute) {
969 PROC_STRING_ATTRIB(Namespace,NAMESPACE,NULL);
970 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
974 class SAML_DLLLOCAL EvidenceImpl : public virtual Evidence,
975 public AbstractComplexElement,
976 public AbstractDOMCachingXMLObject,
977 public AbstractXMLObjectMarshaller,
978 public AbstractXMLObjectUnmarshaller
981 virtual ~EvidenceImpl() {}
983 EvidenceImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
984 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
987 EvidenceImpl(const EvidenceImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
988 for (list<XMLObject*>::const_iterator i=src.m_children.begin(); i!=src.m_children.end(); i++) {
990 AssertionIDRef* ref=dynamic_cast<AssertionIDRef*>(*i);
992 getAssertionIDRefs().push_back(ref->cloneAssertionIDRef());
996 AssertionURIRef* uri=dynamic_cast<AssertionURIRef*>(*i);
998 getAssertionURIRefs().push_back(uri->cloneAssertionURIRef());
1002 Assertion* assertion=dynamic_cast<Assertion*>(*i);
1004 getAssertions().push_back(assertion->cloneAssertion());
1008 EncryptedAssertion* enc=dynamic_cast<EncryptedAssertion*>(*i);
1010 getEncryptedAssertions().push_back(enc->cloneEncryptedAssertion());
1017 IMPL_XMLOBJECT_CLONE(Evidence);
1018 IMPL_TYPED_CHILDREN(AssertionIDRef,m_children.end());
1019 IMPL_TYPED_CHILDREN(AssertionURIRef,m_children.end());
1020 IMPL_TYPED_CHILDREN(Assertion,m_children.end());
1021 IMPL_TYPED_CHILDREN(EncryptedAssertion,m_children.end());
1024 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1025 PROC_TYPED_CHILDREN(AssertionIDRef,SAMLConstants::SAML20_NS,false);
1026 PROC_TYPED_CHILDREN(AssertionURIRef,SAMLConstants::SAML20_NS,false);
1027 PROC_TYPED_CHILDREN(Assertion,SAMLConstants::SAML20_NS,false);
1028 PROC_TYPED_CHILDREN(EncryptedAssertion,SAMLConstants::SAML20_NS,false);
1029 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
1033 class SAML_DLLLOCAL AuthzDecisionStatementImpl : public virtual AuthzDecisionStatement,
1034 public AbstractComplexElement,
1035 public AbstractDOMCachingXMLObject,
1036 public AbstractXMLObjectMarshaller,
1037 public AbstractXMLObjectUnmarshaller
1043 m_children.push_back(NULL);
1044 m_pos_Evidence=m_children.begin();
1047 virtual ~AuthzDecisionStatementImpl() {
1048 XMLString::release(&m_Resource);
1049 XMLString::release(&m_Decision);
1052 AuthzDecisionStatementImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1053 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1057 AuthzDecisionStatementImpl(const AuthzDecisionStatementImpl& src)
1058 : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
1060 setResource(src.getResource());
1061 setDecision(src.getDecision());
1062 if (src.getEvidence())
1063 setEvidence(src.getEvidence()->cloneEvidence());
1064 VectorOf(Action) v=getActions();
1065 for (vector<Action*>::const_iterator i=src.m_Actions.begin(); i!=src.m_Actions.end(); i++) {
1067 v.push_back((*i)->cloneAction());
1072 IMPL_XMLOBJECT_CLONE(AuthzDecisionStatement);
1073 Statement* cloneStatement() const {
1074 return cloneAuthzDecisionStatement();
1076 IMPL_STRING_ATTRIB(Resource);
1077 IMPL_STRING_ATTRIB(Decision);
1078 IMPL_TYPED_CHILD(Evidence);
1079 IMPL_TYPED_CHILDREN(Action, m_pos_Evidence);
1082 void marshallAttributes(DOMElement* domElement) const {
1083 MARSHALL_STRING_ATTRIB(Resource,RESOURCE,NULL);
1084 MARSHALL_STRING_ATTRIB(Decision,DECISION,NULL);
1087 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1088 PROC_TYPED_CHILD(Evidence,SAMLConstants::SAML20_NS,false);
1089 PROC_TYPED_CHILDREN(Action,SAMLConstants::SAML20_NS,false);
1090 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
1093 void processAttribute(const DOMAttr* attribute) {
1094 PROC_STRING_ATTRIB(Resource,RESOURCE,NULL);
1095 PROC_STRING_ATTRIB(Decision,DECISION,NULL);
1096 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
1100 class SAML_DLLLOCAL AttributeValueImpl : public virtual AttributeValue, public AnyElementImpl
1103 virtual ~AttributeValueImpl() {}
1105 AttributeValueImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1106 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1109 AttributeValueImpl(const AttributeValueImpl& src) : AnyElementImpl(src) {
1112 IMPL_XMLOBJECT_CLONE(AttributeValue);
1116 class SAML_DLLLOCAL AttributeImpl : public virtual Attribute,
1117 public AbstractComplexElement,
1118 public AbstractAttributeExtensibleXMLObject,
1119 public AbstractDOMCachingXMLObject,
1120 public AbstractXMLObjectMarshaller,
1121 public AbstractXMLObjectUnmarshaller
1124 m_Name=m_NameFormat=m_FriendlyName=NULL;
1127 virtual ~AttributeImpl() {
1128 XMLString::release(&m_Name);
1129 XMLString::release(&m_NameFormat);
1130 XMLString::release(&m_FriendlyName);
1133 AttributeImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1134 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1138 AttributeImpl(const AttributeImpl& src)
1139 : AbstractXMLObject(src), AbstractAttributeExtensibleXMLObject(src), AbstractDOMCachingXMLObject(src) {
1141 setName(src.getName());
1142 setNameFormat(src.getNameFormat());
1143 setFriendlyName(src.getFriendlyName());
1144 VectorOf(XMLObject) v=getAttributeValues();
1145 for (vector<XMLObject*>::const_iterator i=src.m_AttributeValues.begin(); i!=src.m_AttributeValues.end(); i++) {
1147 v.push_back((*i)->clone());
1152 IMPL_XMLOBJECT_CLONE(Attribute);
1153 IMPL_STRING_ATTRIB(Name);
1154 IMPL_STRING_ATTRIB(NameFormat);
1155 IMPL_STRING_ATTRIB(FriendlyName);
1156 IMPL_XMLOBJECT_CHILDREN(AttributeValue,m_children.end());
1158 void setAttribute(QName& qualifiedName, const XMLCh* value) {
1159 if (!qualifiedName.hasNamespaceURI()) {
1160 if (XMLString::equals(qualifiedName.getLocalPart(),NAME_ATTRIB_NAME)) {
1164 else if (XMLString::equals(qualifiedName.getLocalPart(),NAMEFORMAT_ATTRIB_NAME)) {
1165 setNameFormat(value);
1168 else if (XMLString::equals(qualifiedName.getLocalPart(),FRIENDLYNAME_ATTRIB_NAME)) {
1169 setFriendlyName(value);
1173 AbstractAttributeExtensibleXMLObject::setAttribute(qualifiedName, value);
1177 void marshallAttributes(DOMElement* domElement) const {
1178 MARSHALL_STRING_ATTRIB(Name,NAME,NULL);
1179 MARSHALL_STRING_ATTRIB(NameFormat,NAMEFORMAT,NULL);
1180 MARSHALL_STRING_ATTRIB(FriendlyName,FRIENDLYNAME,NULL);
1182 // Take care of wildcard.
1183 for (map<QName,XMLCh*>::const_iterator i=m_attributeMap.begin(); i!=m_attributeMap.end(); i++) {
1184 DOMAttr* attr=domElement->getOwnerDocument()->createAttributeNS(i->first.getNamespaceURI(),i->first.getLocalPart());
1185 if (i->first.hasPrefix())
1186 attr->setPrefix(i->first.getPrefix());
1187 attr->setNodeValue(i->second);
1188 domElement->setAttributeNode(attr);
1192 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1193 getAttributeValues().push_back(childXMLObject);
1196 void processAttribute(const DOMAttr* attribute) {
1197 QName q(attribute->getNamespaceURI(),attribute->getLocalName(),attribute->getPrefix());
1198 setAttribute(q,attribute->getNodeValue());
1202 class SAML_DLLLOCAL EncryptedAttributeImpl : public virtual EncryptedAttribute, public EncryptedElementTypeImpl
1205 virtual ~EncryptedAttributeImpl() {}
1207 EncryptedAttributeImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1208 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {}
1210 EncryptedAttributeImpl(const EncryptedAttributeImpl& src) : AbstractXMLObject(src), EncryptedElementTypeImpl(src) {}
1212 IMPL_XMLOBJECT_CLONE(EncryptedAttribute);
1213 EncryptedElementType* cloneEncryptedElementType() const {
1214 return new EncryptedAttributeImpl(*this);
1218 class SAML_DLLLOCAL AttributeStatementImpl : public virtual AttributeStatement,
1219 public AbstractComplexElement,
1220 public AbstractDOMCachingXMLObject,
1221 public AbstractXMLObjectMarshaller,
1222 public AbstractXMLObjectUnmarshaller
1225 virtual ~AttributeStatementImpl() {}
1227 AttributeStatementImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1228 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1231 AttributeStatementImpl(const AttributeStatementImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
1232 for (list<XMLObject*>::const_iterator i=src.m_children.begin(); i!=src.m_children.end(); i++) {
1234 Attribute* attribute=dynamic_cast<Attribute*>(*i);
1236 getAttributes().push_back(attribute->cloneAttribute());
1240 EncryptedAttribute* enc=dynamic_cast<EncryptedAttribute*>(*i);
1242 getEncryptedAttributes().push_back(enc->cloneEncryptedAttribute());
1249 IMPL_XMLOBJECT_CLONE(AttributeStatement);
1250 Statement* cloneStatement() const {
1251 return cloneAttributeStatement();
1253 IMPL_TYPED_CHILDREN(Attribute, m_children.end());
1254 IMPL_TYPED_CHILDREN(EncryptedAttribute, m_children.end());
1257 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1258 PROC_TYPED_CHILDREN(Attribute,SAMLConstants::SAML20_NS,false);
1259 PROC_TYPED_CHILDREN(EncryptedAttribute,SAMLConstants::SAML20_NS,false);
1260 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
1264 class SAML_DLLLOCAL AdviceImpl : public virtual Advice,
1265 public AbstractComplexElement,
1266 public AbstractDOMCachingXMLObject,
1267 public AbstractXMLObjectMarshaller,
1268 public AbstractXMLObjectUnmarshaller
1271 virtual ~AdviceImpl() {}
1273 AdviceImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1274 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1277 AdviceImpl(const AdviceImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
1278 for (list<XMLObject*>::const_iterator i=src.m_children.begin(); i!=src.m_children.end(); i++) {
1280 AssertionIDRef* ref=dynamic_cast<AssertionIDRef*>(*i);
1282 getAssertionIDRefs().push_back(ref->cloneAssertionIDRef());
1286 AssertionURIRef* uri=dynamic_cast<AssertionURIRef*>(*i);
1288 getAssertionURIRefs().push_back(uri->cloneAssertionURIRef());
1292 Assertion* assertion=dynamic_cast<Assertion*>(*i);
1294 getAssertions().push_back(assertion->cloneAssertion());
1298 EncryptedAssertion* enc=dynamic_cast<EncryptedAssertion*>(*i);
1300 getEncryptedAssertions().push_back(enc->cloneEncryptedAssertion());
1304 getOthers().push_back((*i)->clone());
1309 IMPL_XMLOBJECT_CLONE(Advice);
1310 IMPL_TYPED_CHILDREN(AssertionIDRef,m_children.end());
1311 IMPL_TYPED_CHILDREN(AssertionURIRef,m_children.end());
1312 IMPL_TYPED_CHILDREN(Assertion,m_children.end());
1313 IMPL_TYPED_CHILDREN(EncryptedAssertion,m_children.end());
1314 IMPL_XMLOBJECT_CHILDREN(Other,m_children.end());
1317 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1318 PROC_TYPED_CHILDREN(AssertionIDRef,SAMLConstants::SAML20_NS,false);
1319 PROC_TYPED_CHILDREN(AssertionURIRef,SAMLConstants::SAML20_NS,false);
1320 PROC_TYPED_CHILDREN(Assertion,SAMLConstants::SAML20_NS,false);
1321 PROC_TYPED_CHILDREN(EncryptedAssertion,SAMLConstants::SAML20_NS,false);
1324 const XMLCh* nsURI=root->getNamespaceURI();
1325 if (!XMLString::equals(nsURI,SAMLConstants::SAML20_NS) && nsURI && *nsURI) {
1326 getOthers().push_back(childXMLObject);
1330 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
1334 class SAML_DLLLOCAL EncryptedAssertionImpl : public virtual EncryptedAssertion, public EncryptedElementTypeImpl
1337 virtual ~EncryptedAssertionImpl() {}
1339 EncryptedAssertionImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1340 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {}
1342 EncryptedAssertionImpl(const EncryptedAssertionImpl& src) : AbstractXMLObject(src), EncryptedElementTypeImpl(src) {}
1344 IMPL_XMLOBJECT_CLONE(EncryptedAssertion);
1345 EncryptedElementType* cloneEncryptedElementType() const {
1346 return new EncryptedAssertionImpl(*this);
1350 class SAML_DLLLOCAL AssertionImpl : public virtual Assertion,
1351 public AbstractComplexElement,
1352 public AbstractDOMCachingXMLObject,
1353 public AbstractXMLObjectMarshaller,
1354 public AbstractXMLObjectUnmarshaller
1359 m_IssueInstant=NULL;
1365 m_children.push_back(NULL);
1366 m_children.push_back(NULL);
1367 m_children.push_back(NULL);
1368 m_children.push_back(NULL);
1369 m_children.push_back(NULL);
1370 m_pos_Issuer=m_children.begin();
1371 m_pos_Signature=m_pos_Issuer;
1373 m_pos_Subject=m_pos_Signature;
1375 m_pos_Conditions=m_pos_Subject;
1377 m_pos_Advice=m_pos_Conditions;
1381 virtual ~AssertionImpl() {
1382 XMLString::release(&m_ID);
1383 XMLString::release(&m_Version);
1384 delete m_IssueInstant;
1387 AssertionImpl(const XMLCh* nsURI, const XMLCh* localName, const XMLCh* prefix, const QName* schemaType)
1388 : AbstractXMLObject(nsURI, localName, prefix, schemaType) {
1392 AssertionImpl(const AssertionImpl& src) : AbstractXMLObject(src), AbstractDOMCachingXMLObject(src) {
1394 setVersion(src.getVersion());
1396 setIssueInstant(src.getIssueInstant());
1397 if (src.getIssuer())
1398 setIssuer(src.getIssuer()->cloneIssuer());
1399 if (src.getSignature())
1400 setSignature(src.getSignature()->cloneSignature());
1401 if (src.getSubject())
1402 setSubject(src.getSubject()->cloneSubject());
1403 if (src.getConditions())
1404 setConditions(src.getConditions()->cloneConditions());
1405 if (src.getAdvice())
1406 setAdvice(src.getAdvice()->cloneAdvice());
1407 for (list<XMLObject*>::const_iterator i=src.m_children.begin(); i!=src.m_children.end(); i++) {
1409 AuthnStatement* authst=dynamic_cast<AuthnStatement*>(*i);
1411 getAuthnStatements().push_back(authst->cloneAuthnStatement());
1415 AttributeStatement* attst=dynamic_cast<AttributeStatement*>(*i);
1417 getAttributeStatements().push_back(attst->cloneAttributeStatement());
1421 AuthzDecisionStatement* authzst=dynamic_cast<AuthzDecisionStatement*>(*i);
1423 getAuthzDecisionStatements().push_back(authzst->cloneAuthzDecisionStatement());
1427 Statement* st=dynamic_cast<Statement*>(*i);
1429 getStatements().push_back(st->cloneStatement());
1436 const XMLCh* getId() const {
1440 //IMPL_TYPED_CHILD(Signature);
1441 // Need customized setter.
1443 Signature* m_Signature;
1444 list<XMLObject*>::iterator m_pos_Signature;
1446 Signature* getSignature() const {
1450 void setSignature(Signature* sig) {
1451 prepareForAssignment(m_Signature,sig);
1452 *m_pos_Signature=m_Signature=sig;
1453 // Sync content reference back up.
1455 m_Signature->setContentReference(new opensaml::ContentReference(*this));
1458 IMPL_XMLOBJECT_CLONE(Assertion);
1459 IMPL_STRING_ATTRIB(Version);
1460 IMPL_STRING_ATTRIB(ID);
1461 IMPL_DATETIME_ATTRIB(IssueInstant,0);
1462 IMPL_TYPED_CHILD(Issuer);
1463 IMPL_TYPED_CHILD(Subject);
1464 IMPL_TYPED_CHILD(Conditions);
1465 IMPL_TYPED_CHILD(Advice);
1466 IMPL_TYPED_CHILDREN(Statement, m_children.end());
1467 IMPL_TYPED_CHILDREN(AuthnStatement, m_children.end());
1468 IMPL_TYPED_CHILDREN(AttributeStatement, m_children.end());
1469 IMPL_TYPED_CHILDREN(AuthzDecisionStatement, m_children.end());
1472 void marshallAttributes(DOMElement* domElement) const {
1474 const_cast<AssertionImpl*>(this)->m_Version=XMLString::transcode("2.0");
1475 MARSHALL_STRING_ATTRIB(Version,VER,NULL);
1477 const_cast<AssertionImpl*>(this)->m_ID=SAMLConfig::getConfig().generateIdentifier();
1478 MARSHALL_ID_ATTRIB(ID,ID,NULL);
1479 if (!m_IssueInstant) {
1480 const_cast<AssertionImpl*>(this)->m_IssueInstantEpoch=time(NULL);
1481 const_cast<AssertionImpl*>(this)->m_IssueInstant=new DateTime(m_IssueInstantEpoch);
1483 MARSHALL_DATETIME_ATTRIB(IssueInstant,ISSUEINSTANT,NULL);
1486 void processChildElement(XMLObject* childXMLObject, const DOMElement* root) {
1487 PROC_TYPED_CHILD(Issuer,SAMLConstants::SAML20_NS,false);
1488 PROC_TYPED_CHILD(Signature,XMLConstants::XMLSIG_NS,false);
1489 PROC_TYPED_CHILD(Subject,SAMLConstants::SAML20_NS,false);
1490 PROC_TYPED_CHILD(Conditions,SAMLConstants::SAML20_NS,false);
1491 PROC_TYPED_CHILD(Advice,SAMLConstants::SAML20_NS,false);
1492 PROC_TYPED_CHILDREN(AuthnStatement,SAMLConstants::SAML20_NS,false);
1493 PROC_TYPED_CHILDREN(AttributeStatement,SAMLConstants::SAML20_NS,false);
1494 PROC_TYPED_CHILDREN(AuthzDecisionStatement,SAMLConstants::SAML20_NS,false);
1495 PROC_TYPED_CHILDREN(Statement,SAMLConstants::SAML20_NS,false);
1496 AbstractXMLObjectUnmarshaller::processChildElement(childXMLObject,root);
1499 void processAttribute(const DOMAttr* attribute) {
1500 PROC_STRING_ATTRIB(Version,VER,NULL);
1501 PROC_ID_ATTRIB(ID,ID,NULL);
1502 PROC_DATETIME_ATTRIB(IssueInstant,ISSUEINSTANT,NULL);
1503 AbstractXMLObjectUnmarshaller::processAttribute(attribute);
1510 #if defined (_MSC_VER)
1511 #pragma warning( pop )
1514 // Builder Implementations
1516 IMPL_XMLOBJECTBUILDER(Action);
1517 IMPL_XMLOBJECTBUILDER(Advice);
1518 IMPL_XMLOBJECTBUILDER(Assertion);
1519 IMPL_XMLOBJECTBUILDER(AssertionIDRef);
1520 IMPL_XMLOBJECTBUILDER(AssertionURIRef);
1521 IMPL_XMLOBJECTBUILDER(Attribute);
1522 IMPL_XMLOBJECTBUILDER(AttributeStatement);
1523 IMPL_XMLOBJECTBUILDER(AttributeValue);
1524 IMPL_XMLOBJECTBUILDER(Audience);
1525 IMPL_XMLOBJECTBUILDER(AudienceRestriction);
1526 IMPL_XMLOBJECTBUILDER(AuthenticatingAuthority);
1527 IMPL_XMLOBJECTBUILDER(AuthnContext);
1528 IMPL_XMLOBJECTBUILDER(AuthnContextClassRef);
1529 IMPL_XMLOBJECTBUILDER(AuthnContextDecl);
1530 IMPL_XMLOBJECTBUILDER(AuthnContextDeclRef);
1531 IMPL_XMLOBJECTBUILDER(AuthnStatement);
1532 IMPL_XMLOBJECTBUILDER(AuthzDecisionStatement);
1533 IMPL_XMLOBJECTBUILDER(Conditions);
1534 IMPL_XMLOBJECTBUILDER(EncryptedAssertion);
1535 IMPL_XMLOBJECTBUILDER(EncryptedAttribute);
1536 IMPL_XMLOBJECTBUILDER(EncryptedID);
1537 IMPL_XMLOBJECTBUILDER(Evidence);
1538 IMPL_XMLOBJECTBUILDER(Issuer);
1539 IMPL_XMLOBJECTBUILDER(KeyInfoConfirmationDataType);
1540 IMPL_XMLOBJECTBUILDER(NameID);
1541 IMPL_XMLOBJECTBUILDER(NameIDType);
1542 IMPL_XMLOBJECTBUILDER(OneTimeUse);
1543 IMPL_XMLOBJECTBUILDER(ProxyRestriction);
1544 IMPL_XMLOBJECTBUILDER(Subject);
1545 IMPL_XMLOBJECTBUILDER(SubjectConfirmation);
1546 IMPL_XMLOBJECTBUILDER(SubjectConfirmationData);
1547 IMPL_XMLOBJECTBUILDER(SubjectLocality);
1550 const XMLCh Action::LOCAL_NAME[] = UNICODE_LITERAL_6(A,c,t,i,o,n);
1551 const XMLCh Action::TYPE_NAME[] = UNICODE_LITERAL_10(A,c,t,i,o,n,T,y,p,e);
1552 const XMLCh Action::NAMESPACE_ATTRIB_NAME[] = UNICODE_LITERAL_9(N,a,m,e,s,p,a,c,e);
1553 const XMLCh Advice::LOCAL_NAME[] = UNICODE_LITERAL_6(A,d,v,i,c,e);
1554 const XMLCh Advice::TYPE_NAME[] = UNICODE_LITERAL_10(A,d,v,i,c,e,T,y,p,e);
1555 const XMLCh Assertion::LOCAL_NAME[] = UNICODE_LITERAL_9(A,s,s,e,r,t,i,o,n);
1556 const XMLCh Assertion::TYPE_NAME[] = UNICODE_LITERAL_13(A,s,s,e,r,t,i,o,n,T,y,p,e);
1557 const XMLCh Assertion::VER_ATTRIB_NAME[] = UNICODE_LITERAL_7(V,e,r,s,i,o,n);
1558 const XMLCh Assertion::ID_ATTRIB_NAME[] = UNICODE_LITERAL_2(I,D);
1559 const XMLCh Assertion::ISSUEINSTANT_ATTRIB_NAME[] = UNICODE_LITERAL_12(I,s,s,u,e,I,n,s,t,a,n,t);
1560 const XMLCh AssertionIDRef::LOCAL_NAME[] = UNICODE_LITERAL_14(A,s,s,e,r,t,i,o,n,I,D,R,e,f);
1561 const XMLCh AssertionURIRef::LOCAL_NAME[] = UNICODE_LITERAL_15(A,s,s,e,r,t,i,o,n,U,R,I,R,e,f);
1562 const XMLCh Attribute::LOCAL_NAME[] = UNICODE_LITERAL_9(A,t,t,r,i,b,u,t,e);
1563 const XMLCh Attribute::TYPE_NAME[] = UNICODE_LITERAL_13(A,t,t,r,i,b,u,t,e,T,y,p,e);
1564 const XMLCh Attribute::NAME_ATTRIB_NAME[] = UNICODE_LITERAL_4(N,a,m,e);
1565 const XMLCh Attribute::NAMEFORMAT_ATTRIB_NAME[] = UNICODE_LITERAL_10(N,a,m,e,F,o,r,m,a,t);
1566 const XMLCh Attribute::FRIENDLYNAME_ATTRIB_NAME[] = UNICODE_LITERAL_12(F,r,i,e,n,d,l,y,N,a,m,e);
1567 const XMLCh AttributeStatement::LOCAL_NAME[] = UNICODE_LITERAL_18(A,t,t,r,i,b,u,t,e,S,t,a,t,e,m,e,n,t);
1568 const XMLCh AttributeStatement::TYPE_NAME[] = UNICODE_LITERAL_22(A,t,t,r,i,b,u,t,e,S,t,a,t,e,m,e,n,t,T,y,p,e);
1569 const XMLCh AttributeValue::LOCAL_NAME[] = UNICODE_LITERAL_14(A,t,t,r,i,b,u,t,e,V,a,l,u,e);
1570 const XMLCh Audience::LOCAL_NAME[] = UNICODE_LITERAL_8(A,u,d,i,e,n,c,e);
1571 const XMLCh AudienceRestriction::LOCAL_NAME[] = UNICODE_LITERAL_19(A,u,d,i,e,n,c,e,R,e,s,t,r,i,c,t,i,o,n);
1572 const XMLCh AudienceRestriction::TYPE_NAME[] = UNICODE_LITERAL_23(A,u,d,i,e,n,c,e,R,e,s,t,r,i,c,t,i,o,n,T,y,p,e);
1573 const XMLCh AuthenticatingAuthority::LOCAL_NAME[] = UNICODE_LITERAL_23(A,u,t,h,e,n,t,i,c,a,t,i,n,g,A,u,t,h,o,r,i,t,y);
1574 const XMLCh AuthnContext::LOCAL_NAME[] = UNICODE_LITERAL_12(A,u,t,h,n,C,o,n,t,e,x,t);
1575 const XMLCh AuthnContext::TYPE_NAME[] = UNICODE_LITERAL_16(A,u,t,h,n,C,o,n,t,e,x,t,T,y,p,e);
1576 const XMLCh AuthnContextClassRef::LOCAL_NAME[] = UNICODE_LITERAL_20(A,u,t,h,n,C,o,n,t,e,x,t,C,l,a,s,s,R,e,f);
1577 const XMLCh AuthnContextDecl::LOCAL_NAME[] = UNICODE_LITERAL_16(A,u,t,h,n,C,o,n,t,e,x,t,D,e,c,l);
1578 const XMLCh AuthnContextDeclRef::LOCAL_NAME[] = UNICODE_LITERAL_19(A,u,t,h,n,C,o,n,t,e,x,t,D,e,c,l,R,e,f);
1579 const XMLCh AuthnStatement::LOCAL_NAME[] = UNICODE_LITERAL_14(A,u,t,h,n,S,t,a,t,e,m,e,n,t);
1580 const XMLCh AuthnStatement::TYPE_NAME[] = UNICODE_LITERAL_18(A,u,t,h,n,S,t,a,t,e,m,e,n,t,T,y,p,e);
1581 const XMLCh AuthnStatement::AUTHNINSTANT_ATTRIB_NAME[] = UNICODE_LITERAL_12(A,u,t,h,n,I,n,s,t,a,n,t);
1582 const XMLCh AuthnStatement::SESSIONINDEX_ATTRIB_NAME[] = UNICODE_LITERAL_12(S,e,s,s,i,o,n,I,n,d,e,x);
1583 const XMLCh AuthnStatement::SESSIONNOTONORAFTER_ATTRIB_NAME[] = UNICODE_LITERAL_19(S,e,s,s,i,o,n,N,o,t,O,n,O,r,A,f,t,e,r);
1584 const XMLCh AuthzDecisionStatement::LOCAL_NAME[] = UNICODE_LITERAL_22(A,u,t,h,z,D,e,c,i,s,i,o,n,S,t,a,t,e,m,e,n,t);
1585 const XMLCh AuthzDecisionStatement::TYPE_NAME[] = UNICODE_LITERAL_26(A,u,t,h,z,D,e,c,i,s,i,o,n,S,t,a,t,e,m,e,n,t,T,y,p,e);
1586 const XMLCh AuthzDecisionStatement::RESOURCE_ATTRIB_NAME[] = UNICODE_LITERAL_8(R,e,s,o,u,r,c,e);
1587 const XMLCh AuthzDecisionStatement::DECISION_ATTRIB_NAME[] = UNICODE_LITERAL_8(D,e,c,i,s,i,o,n);
1588 const XMLCh AuthzDecisionStatement::DECISION_PERMIT[] = UNICODE_LITERAL_6(P,e,r,m,i,t);
1589 const XMLCh AuthzDecisionStatement::DECISION_DENY[] = UNICODE_LITERAL_4(D,e,n,y);
1590 const XMLCh AuthzDecisionStatement::DECISION_INDETERMINATE[] = UNICODE_LITERAL_13(I,n,d,e,t,e,r,m,i,n,a,t,e);
1591 const XMLCh BaseID::LOCAL_NAME[] = UNICODE_LITERAL_6(B,a,s,e,I,D);
1592 const XMLCh BaseID::NAMEQUALIFIER_ATTRIB_NAME[] = UNICODE_LITERAL_13(N,a,m,e,Q,u,a,l,i,f,i,e,r);
1593 const XMLCh BaseID::SPNAMEQUALIFIER_ATTRIB_NAME[] = UNICODE_LITERAL_15(S,P,N,a,m,e,Q,u,a,l,i,f,i,e,r);
1594 const XMLCh Condition::LOCAL_NAME[] = UNICODE_LITERAL_9(C,o,n,d,i,t,i,o,n);
1595 const XMLCh Conditions::LOCAL_NAME[] = UNICODE_LITERAL_10(C,o,n,d,i,t,i,o,n,s);
1596 const XMLCh Conditions::TYPE_NAME[] = UNICODE_LITERAL_14(C,o,n,d,i,t,i,o,n,s,T,y,p,e);
1597 const XMLCh Conditions::NOTBEFORE_ATTRIB_NAME[] = UNICODE_LITERAL_9(N,o,t,B,e,f,o,r,e);
1598 const XMLCh Conditions::NOTONORAFTER_ATTRIB_NAME[] =UNICODE_LITERAL_12(N,o,t,O,n,O,r,A,f,t,e,r);
1599 const XMLCh EncryptedAssertion::LOCAL_NAME[] = UNICODE_LITERAL_18(E,n,c,r,y,p,t,e,d,A,s,s,e,r,t,i,o,n);
1600 const XMLCh EncryptedAttribute::LOCAL_NAME[] = UNICODE_LITERAL_18(E,n,c,r,y,p,t,e,d,A,t,t,r,i,b,u,t,e);
1601 const XMLCh EncryptedElementType::LOCAL_NAME[] = {chNull};
1602 const XMLCh EncryptedElementType::TYPE_NAME[] = UNICODE_LITERAL_20(E,n,c,r,y,p,t,e,d,E,l,e,m,e,n,t,T,y,p,e);
1603 const XMLCh EncryptedID::LOCAL_NAME[] = UNICODE_LITERAL_11(E,n,c,r,y,p,t,e,d,I,d);
1604 const XMLCh Evidence::LOCAL_NAME[] = UNICODE_LITERAL_8(E,v,i,d,e,n,c,e);
1605 const XMLCh Evidence::TYPE_NAME[] = UNICODE_LITERAL_12(E,v,i,d,e,n,c,e,T,y,p,e);
1606 const XMLCh Issuer::LOCAL_NAME[] = UNICODE_LITERAL_6(I,s,s,u,e,r);
1607 const XMLCh KeyInfoConfirmationDataType::LOCAL_NAME[] = UNICODE_LITERAL_23(S,u,b,j,e,c,t,C,o,n,f,i,r,m,a,t,i,o,n,D,a,t,a);
1608 const XMLCh KeyInfoConfirmationDataType::TYPE_NAME[] = UNICODE_LITERAL_27(K,e,y,I,n,f,o,C,o,n,f,i,r,m,a,t,i,o,n,D,a,t,a,T,y,p,e);
1609 const XMLCh KeyInfoConfirmationDataType::NOTBEFORE_ATTRIB_NAME[] = UNICODE_LITERAL_9(N,o,t,B,e,f,o,r,e);
1610 const XMLCh KeyInfoConfirmationDataType::NOTONORAFTER_ATTRIB_NAME[] = UNICODE_LITERAL_12(N,o,t,O,n,O,r,A,f,t,e,r);
1611 const XMLCh KeyInfoConfirmationDataType::INRESPONSETO_ATTRIB_NAME[] = UNICODE_LITERAL_12(I,n,R,e,s,p,o,n,s,e,T,o);
1612 const XMLCh KeyInfoConfirmationDataType::RECIPIENT_ATTRIB_NAME[] = UNICODE_LITERAL_9(R,e,c,i,p,i,e,n,t);
1613 const XMLCh KeyInfoConfirmationDataType::ADDRESS_ATTRIB_NAME[] = UNICODE_LITERAL_7(A,d,d,r,e,s,s);
1614 const XMLCh NameID::LOCAL_NAME[] = UNICODE_LITERAL_6(N,a,m,e,I,D);
1615 const XMLCh NameIDType::LOCAL_NAME[] = {chNull};
1616 const XMLCh NameIDType::TYPE_NAME[] = UNICODE_LITERAL_10(N,a,m,e,I,D,T,y,p,e);
1617 const XMLCh NameIDType::NAMEQUALIFIER_ATTRIB_NAME[] = UNICODE_LITERAL_13(N,a,m,e,Q,u,a,l,i,f,i,e,r);
1618 const XMLCh NameIDType::SPNAMEQUALIFIER_ATTRIB_NAME[] = UNICODE_LITERAL_15(S,P,N,a,m,e,Q,u,a,l,i,f,i,e,r);
1619 const XMLCh NameIDType::FORMAT_ATTRIB_NAME[] = UNICODE_LITERAL_6(F,o,r,m,a,t);
1620 const XMLCh NameIDType::SPPROVIDEDID_ATTRIB_NAME[] = UNICODE_LITERAL_12(S,P,P,r,o,v,i,d,e,d,I,D);
1621 const XMLCh OneTimeUse::LOCAL_NAME[] = UNICODE_LITERAL_10(O,n,e,T,i,m,e,U,s,e);
1622 const XMLCh OneTimeUse::TYPE_NAME[] = UNICODE_LITERAL_14(O,n,e,T,i,m,e,U,s,e,T,y,p,e);
1623 const XMLCh ProxyRestriction::LOCAL_NAME[] = UNICODE_LITERAL_16(P,r,o,x,y,R,e,s,t,r,i,c,t,i,o,n);
1624 const XMLCh ProxyRestriction::TYPE_NAME[] = UNICODE_LITERAL_20(P,r,o,x,y,R,e,s,t,r,i,c,t,i,o,n,T,y,p,e);
1625 const XMLCh ProxyRestriction::COUNT_ATTRIB_NAME[] = UNICODE_LITERAL_5(C,o,u,n,t);
1626 const XMLCh Statement::LOCAL_NAME[] = UNICODE_LITERAL_9(S,t,a,t,e,m,e,n,t);
1627 const XMLCh Subject::LOCAL_NAME[] = UNICODE_LITERAL_7(S,u,b,j,e,c,t);
1628 const XMLCh Subject::TYPE_NAME[] = UNICODE_LITERAL_11(S,u,b,j,e,c,t,T,y,p,e);
1629 const XMLCh SubjectConfirmation::LOCAL_NAME[] = UNICODE_LITERAL_19(S,u,b,j,e,c,t,C,o,n,f,i,r,m,a,t,i,o,n);
1630 const XMLCh SubjectConfirmation::TYPE_NAME[] = UNICODE_LITERAL_23(S,u,b,j,e,c,t,C,o,n,f,i,r,m,a,t,i,o,n,T,y,p,e);
1631 const XMLCh SubjectConfirmation::METHOD_ATTRIB_NAME[] = UNICODE_LITERAL_6(M,e,t,h,o,d);
1632 const XMLCh SubjectConfirmationData::LOCAL_NAME[] = UNICODE_LITERAL_23(S,u,b,j,e,c,t,C,o,n,f,i,r,m,a,t,i,o,n,D,a,t,a);
1633 const XMLCh SubjectConfirmationData::NOTBEFORE_ATTRIB_NAME[] = UNICODE_LITERAL_9(N,o,t,B,e,f,o,r,e);
1634 const XMLCh SubjectConfirmationData::NOTONORAFTER_ATTRIB_NAME[] = UNICODE_LITERAL_12(N,o,t,O,n,O,r,A,f,t,e,r);
1635 const XMLCh SubjectConfirmationData::INRESPONSETO_ATTRIB_NAME[] = UNICODE_LITERAL_12(I,n,R,e,s,p,o,n,s,e,T,o);
1636 const XMLCh SubjectConfirmationData::RECIPIENT_ATTRIB_NAME[] = UNICODE_LITERAL_9(R,e,c,i,p,i,e,n,t);
1637 const XMLCh SubjectConfirmationData::ADDRESS_ATTRIB_NAME[] = UNICODE_LITERAL_7(A,d,d,r,e,s,s);
1638 const XMLCh SubjectLocality::LOCAL_NAME[] = UNICODE_LITERAL_15(S,u,b,j,e,c,t,L,o,c,a,l,i,t,y);
1639 const XMLCh SubjectLocality::TYPE_NAME[] = UNICODE_LITERAL_19(S,u,b,j,e,c,t,L,o,c,a,l,i,t,y,T,y,p,e);
1640 const XMLCh SubjectLocality::ADDRESS_ATTRIB_NAME[] =UNICODE_LITERAL_7(A,d,d,r,e,s,s);
1641 const XMLCh SubjectLocality::DNSNAME_ATTRIB_NAME[] =UNICODE_LITERAL_7(D,N,S,N,a,m,e);