• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/samples/wsse/

Lines Matching defs:soap

108 { struct soap *soap;
116 soap = soap_new();
118 soap_register_plugin(soap, soap_wsse);
122 soap_set_omode(soap, SOAP_IO_CHUNK);
124 soap_set_omode(soap, SOAP_IO_STORE);
126 soap_set_omode(soap, SOAP_XML_INDENT);
128 soap_set_omode(soap, SOAP_XML_CANONICAL);
142 soap_set_mode(soap, SOAP_ENC_ZLIB);
144 /* soap->actor = "..."; */ /* set only when required */
179 soap->cafile = "cacert.pem";
184 if (!soap_valid_socket(soap_bind(soap, NULL, port, 100)))
185 { soap_print_fault(soap, stderr);
189 while (soap_valid_socket(soap_accept(soap)))
191 soap_wsse_verify_auto(soap, SOAP_SMD_HMAC_SHA1, hmac_key, sizeof(hmac_key));
193 soap_wsse_verify_auto(soap, SOAP_SMD_VRFY_RSA_SHA1, rsa_pubk, 0);
195 soap_wsse_verify_auto(soap, SOAP_SMD_NONE, NULL, 0);
196 if (soap_serve(soap))
197 { soap_wsse_delete_Security(soap);
198 soap_print_fault(soap, stderr);
199 soap_print_fault_location(soap, stderr);
202 soap_print_fault(soap, stderr);
208 soap_wsse_verify_auto(soap, SOAP_SMD_HMAC_SHA1, hmac_key, sizeof(hmac_key));
210 soap_wsse_verify_auto(soap, SOAP_SMD_VRFY_RSA_SHA1, rsa_pubk, 0);
212 soap_wsse_verify_auto(soap, SOAP_SMD_NONE, NULL, 0);
213 if (soap_serve(soap))
214 { soap_wsse_delete_Security(soap);
215 soap_print_fault(soap, stderr);
216 soap_print_fault_location(soap, stderr);
230 soap_wsse_add_Timestamp(soap, "Time", 10);
233 soap_wsse_add_UsernameTokenText(soap, "User", user, "userPass");
235 soap_wsse_add_UsernameTokenDigest(soap, "User", user, "userPass");
238 soap_wsse_sign(soap, SOAP_SMD_HMAC_SHA1, hmac_key, sizeof(hmac_key));
240 soap_wsse_sign_body(soap, SOAP_SMD_HMAC_SHA1, hmac_key, sizeof(hmac_key));
244 soap_wsse_add_KeyInfo_KeyName(soap, "MyKey");
246 { soap_wsse_add_BinarySecurityTokenX509(soap, "X509Token", cert);
247 soap_wsse_add_KeyInfo_SecurityTokenReferenceX509(soap, "#X509Token");
250 soap_wsse_sign(soap, SOAP_SMD_SIGN_RSA_SHA1, rsa_privk, 0);
252 soap_wsse_sign_body(soap, SOAP_SMD_SIGN_RSA_SHA1, rsa_privk, 0);
256 soap_wsse_verify_auto(soap, SOAP_SMD_HMAC_SHA1, hmac_key, sizeof(hmac_key));
258 soap_wsse_verify_auto(soap, SOAP_SMD_VRFY_RSA_SHA1, rsa_pubk, 0);
260 soap_wsse_verify_auto(soap, SOAP_SMD_NONE, NULL, 0);
263 if (!soap_call_ns1__add(soap, endpoint, NULL, 1.0, 2.0, &result))
264 { if (!soap_wsse_verify_Timestamp(soap))
265 { const char *servername = soap_wsse_get_Username(soap);
268 && !soap_wsse_verify_Password(soap, "serverPass"))
272 soap_print_fault(soap, stderr);
277 soap_print_fault(soap, stderr);
281 { soap_print_fault(soap, stderr);
282 soap_print_fault_location(soap, stderr);
285 soap_wsse_delete_Security(soap);
287 soap_wsse_verify_done(soap);
297 soap_end(soap);
298 soap_done(soap);
299 free(soap);
304 int ns1__add(struct soap *soap, double a, double b, double *result)
305 { const char *username = soap_wsse_get_Username(soap);
308 if (soap_wsse_verify_Timestamp(soap)
309 || soap_wsse_verify_Password(soap, "userPass"))
310 { soap_wsse_delete_Security(soap);
311 return soap->error;
313 if (soap_wsse_verify_element(soap, "http://www.genivia.com/schemas/wssetest.xsd", "add") == 0)
314 { soap_wsse_delete_Security(soap);
315 return soap_sender_fault(soap, "Service operation not signed", NULL);
317 soap_wsse_delete_Security(soap);
318 soap_wsse_add_Timestamp(soap, "Time", 10); /* lifetime of 10 seconds */
319 soap_wsse_add_UsernameTokenDigest(soap, "User", "server", "serverPass");
321 soap_wsse_sign_body(soap, SOAP_SMD_HMAC_SHA1, hmac_key, sizeof(hmac_key));
324 soap_wsse_add_KeyInfo_KeyName(soap, "MyKey");
326 { soap_wsse_add_BinarySecurityTokenX509(soap, "X509Token", cert);
327 soap_wsse_add_KeyInfo_SecurityTokenReferenceX509(soap, "#X509Token");
329 soap_wsse_sign_body(soap, SOAP_SMD_SIGN_RSA_SHA1, rsa_privk, 0);
335 int ns1__sub(struct soap *soap, double a, double b, double *result)
336 { const char *username = soap_wsse_get_Username(soap);
339 if (soap_wsse_verify_Timestamp(soap)
340 || soap_wsse_verify_Password(soap, "userPass"))
341 { soap_wsse_delete_Security(soap);
342 return soap->error;
344 if (soap_wsse_verify_element(soap, "http://www.genivia.com/schemas/wssetest.xsd", "sub") == 0)
345 { soap_wsse_delete_Security(soap);
346 return soap_sender_fault(soap, "Service operation not signed", NULL);
348 soap_wsse_delete_Security(soap);
353 soap_wsse_sign_body(soap, SOAP_SMD_HMAC_SHA1, hmac_key, sizeof(hmac_key));
356 soap_wsse_add_KeyInfo_KeyName(soap, "MyKey");
358 { soap_wsse_add_BinarySecurityTokenX509(soap, "X509Token", cert);
359 soap_wsse_add_KeyInfo_SecurityTokenReferenceX509(soap, "#X509Token");
361 soap_wsse_sign_body(soap, SOAP_SMD_SIGN_RSA_SHA1, rsa_privk, 0);
367 int ns1__mul(struct soap *soap, double a, double b, double *result)
368 { const char *username = soap_wsse_get_Username(soap);
371 if (soap_wsse_verify_Timestamp(soap)
372 || soap_wsse_verify_Password(soap, "userPass"))
373 { soap_wsse_delete_Security(soap);
374 return soap->error;
376 if (soap_wsse_verify_element(soap, "http://www.genivia.com/schemas/wssetest.xsd", "mul") == 0)
377 { soap_wsse_delete_Security(soap);
378 return soap_sender_fault(soap, "Service operation not signed", NULL);
380 soap_wsse_delete_Security(soap);
381 soap_wsse_add_Timestamp(soap, "Time", 10); /* lifetime of 10 seconds */
386 soap_wsse_sign_body(soap, SOAP_SMD_HMAC_SHA1, hmac_key, sizeof(hmac_key));
389 soap_wsse_add_KeyInfo_KeyName(soap, "MyKey");
391 { soap_wsse_add_BinarySecurityTokenX509(soap, "X509Token", cert);
392 soap_wsse_add_KeyInfo_SecurityTokenReferenceX509(soap, "#X509Token");
394 soap_wsse_sign_body(soap, SOAP_SMD_SIGN_RSA_SHA1, rsa_privk, 0);
400 int ns1__div(struct soap *soap, double a, double b, double *result)
401 { const char *username = soap_wsse_get_Username(soap);
404 if (soap_wsse_verify_Timestamp(soap)
405 || soap_wsse_verify_Password(soap, "userPass"))
406 { soap_wsse_delete_Security(soap);
407 return soap->error;
409 if (soap_wsse_verify_element(soap, "http://www.genivia.com/schemas/wssetest.xsd", "div") == 0)
410 { soap_wsse_delete_Security(soap);
411 return soap_sender_fault(soap, "Service operation not signed", NULL);
413 soap_wsse_delete_Security(soap);
414 soap_wsse_add_Timestamp(soap, "Time", 10); /* lifetime of 10 seconds */
415 soap_wsse_add_UsernameTokenDigest(soap, "User", "server", "serverPass");
419 return soap_sender_fault(soap, "Division by zero", NULL);