Author: shankar
Date: Fri Apr 4 05:18:54 2008
New Revision: 644690
URL: http://svn.apache.org/viewvc?rev=644690&view=rev
Log:
error message changes
Modified:
webservices/rampart/trunk/c/samples/sct_provider/sct_provider_hash_map.c
webservices/rampart/trunk/c/samples/sct_provider/sct_provider_stored_key.c
webservices/rampart/trunk/c/src/secconv/sct_provider.c
webservices/rampart/trunk/c/src/secconv/security_context_token.c
webservices/rampart/trunk/c/src/util/rampart_context.c
webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c
webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c
webservices/rampart/trunk/c/src/util/rampart_username_token.c
webservices/rampart/trunk/c/src/util/rampart_util.c
Modified:
webservices/rampart/trunk/c/samples/sct_provider/sct_provider_hash_map.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/samples/sct_provider/sct_provider_hash_map.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/samples/sct_provider/sct_provider_hash_map.c
(original)
+++ webservices/rampart/trunk/c/samples/sct_provider/sct_provider_hash_map.c
Fri Apr 4 05:18:54 2008
@@ -84,7 +84,7 @@
sct_db = sct_provider_get_sct_hash(env, msg_ctx);
if(!sct_db)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot find
sct datastore");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] Cannot find sct datastore");
return NULL;
}
@@ -99,14 +99,14 @@
/*check whether rp_property is valid*/
if(!token)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] token
property is not valid");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] token property is not valid");
return NULL;
}
rp_sct = (rp_security_context_token_t*)rp_property_get_value(token, env);
if(!rp_sct)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] value of
token property is not valid");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] value of token property is not valid");
return NULL;
}
@@ -119,14 +119,14 @@
axutil_hash_set(sct_db, sct_db_lable, AXIS2_HASH_KEY_STRING, sct);
return sct;*/
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample]
SecurityContextToken assertion is not supported. Only SecureConversationToken
assertion is supported by this module.");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] SecurityContextToken assertion is not
supported. Only SecureConversationToken assertion is supported by this
module.");
return NULL;
}
/*so the token is secure conversation token. If client side then we can
request from sts. If server side, can't do anything*/
if(server_side)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot find
security context token in server side");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] Cannot find security context token in server
side");
return NULL;
}
@@ -161,7 +161,7 @@
if (!(*inst))
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot
initialize the sct provider module");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] Cannot initialize the sct provider module");
return AXIS2_FAILURE;
}
@@ -232,7 +232,7 @@
rp_sct = (rp_security_context_token_t*)rp_property_get_value(token, env);
if(!rp_sct)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] token
property is not valid");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] token property is not valid");
return NULL;
}
@@ -240,7 +240,7 @@
request the token from STS.*/
if(!rp_security_context_token_get_is_secure_conversation_token(rp_sct,
env))
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] token is not
a secure conversation token.");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] token is not a secure conversation token.");
return NULL;
}
@@ -259,7 +259,7 @@
if(!issuer_address)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] issuer
address is not valid.");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] issuer address is not valid.");
return NULL;
}
}
@@ -268,7 +268,7 @@
client_home =
axis2_conf_get_repo(axis2_conf_ctx_get_conf(axis2_msg_ctx_get_conf_ctx(msg_ctx,
env), env), env);
if(!client_home)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot get
client home");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] Cannot get client home");
return NULL;
}
@@ -309,7 +309,7 @@
rstr = trust_context_get_rstr(trust_context, env);
if(!rstr)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot get
RSTR from STS");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] Cannot get RSTR from STS");
return NULL;
}
@@ -340,7 +340,7 @@
sct = security_context_token_create(env);
if(!sct)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot create
security context token");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] Cannot create security context token");
return NULL;
}
Modified:
webservices/rampart/trunk/c/samples/sct_provider/sct_provider_stored_key.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/samples/sct_provider/sct_provider_stored_key.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/samples/sct_provider/sct_provider_stored_key.c
(original)
+++ webservices/rampart/trunk/c/samples/sct_provider/sct_provider_stored_key.c
Fri Apr 4 05:18:54 2008
@@ -81,7 +81,7 @@
sct_db = sct_provider_get_sct_hash(env, msg_ctx);
if(!sct_db)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot find
sct datastore");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] Cannot find sct datastore");
return NULL;
}
@@ -122,7 +122,7 @@
if (!(*inst))
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot
initialize the sct provider module");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] Cannot initialize the sct provider module");
return AXIS2_FAILURE;
}
@@ -151,7 +151,7 @@
sct = security_context_token_create(env);
if(!sct)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot create
security context token");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][sct_provider_sample] Cannot create security context token");
return NULL;
}
Modified: webservices/rampart/trunk/c/src/secconv/sct_provider.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/secconv/sct_provider.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/secconv/sct_provider.c (original)
+++ webservices/rampart/trunk/c/src/secconv/sct_provider.c Fri Apr 4 05:18:54
2008
@@ -39,7 +39,7 @@
sct_provider =
(rampart_sct_provider_t*)rampart_context_get_sct_provider(rampart_context, env);
if(!sct_provider)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider] Security context
token provider module is not set");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][sct_provider]
Security context token provider module is not set");
return NULL;
}
@@ -48,7 +48,7 @@
if(!sct)
{
- AXIS2_LOG_INFO(env->log, "[rampart][sct_provider] Security context
token is not valid");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][sct_provider]
Security context token is not valid");
}
return sct;
Modified: webservices/rampart/trunk/c/src/secconv/security_context_token.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/secconv/security_context_token.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/secconv/security_context_token.c (original)
+++ webservices/rampart/trunk/c/src/secconv/security_context_token.c Fri Apr 4
05:18:54 2008
@@ -172,7 +172,7 @@
if(!sct->buffer)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Security
context token does not have a shared secret");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,"[rampart][security context
token] Security context token does not have a shared secret");
return NULL;
}
@@ -180,14 +180,14 @@
proof_token_ele = axiom_element_create(env, NULL,
TRUST_REQUESTED_PROOF_TOKEN, ns_obj_wst, &proof_token);
if (!proof_token_ele)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot
create requested proof token");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Cannot create requested proof token");
return NULL;
}
secret_ele = axiom_element_create(env, proof_token, TRUST_BINARY_SECRET,
ns_obj_wst, &secret_node);
if(!secret_ele)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot
create binary secret token");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Cannot create binary secret token");
return NULL;
}
@@ -213,7 +213,7 @@
if(!sct->local_id)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Security
context token does not have a local identifier");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Security context token does not have a local identifier");
return NULL;
}
@@ -235,7 +235,7 @@
if(!sct->global_id)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Security
context token does not have a global identifier");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Security context token does not have a global identifier");
return NULL;
}
@@ -262,7 +262,7 @@
if(!sct->global_id)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Security
context token does not have an identifier.");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Security context token does not have an identifier.");
return NULL;
}
@@ -315,14 +315,14 @@
/*secret_node = oxs_axiom_get_first_child_node_by_name(env, node,
TRUST_BINARY_SECRET, TRUST_WST_XMLNS, NULL);
if(!secret_node)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get
binary secret node from proof token");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Cannot get binary secret node from proof token");
return AXIS2_FAILURE;
}*/
shared_secret = oxs_axiom_get_node_content(env, node);
if(!shared_secret)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get
content of binary secret node");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Cannot get content of binary secret node");
return AXIS2_FAILURE;
}
@@ -352,14 +352,14 @@
ref_token = oxs_axiom_get_first_child_node_by_name(env, node,
OXS_NODE_REFERENCE, OXS_WSSE_XMLNS, NULL);
if(!ref_token)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get
reference node from attached reference");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Cannot get reference node from attached reference");
return AXIS2_FAILURE;
}
local_id = oxs_token_get_reference(env, ref_token);
if(!local_id)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get
attached reference");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Cannot get attached reference");
return AXIS2_FAILURE;
}
@@ -382,14 +382,14 @@
ref_token = oxs_axiom_get_first_child_node_by_name(env, node,
OXS_NODE_REFERENCE, OXS_WSSE_XMLNS, NULL);
if(!ref_token)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get
reference node from unattached reference");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Cannot get reference node from unattached reference");
return AXIS2_FAILURE;
}
reference_id = oxs_token_get_reference(env, ref_token);
if(!reference_id)
{
- AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get
unattached reference");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context
token] Cannot get unattached reference");
return AXIS2_FAILURE;
}
Modified: webservices/rampart/trunk/c/src/util/rampart_context.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_context.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_context.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_context.c Fri Apr 4 05:18:54
2008
@@ -1274,7 +1274,7 @@
/*if(axutil_strcmp(nspace, RP_SECURITY_NS)==0)*/
if((axutil_strcmp(nspace, RP_SECURITY_NS)==0) && (!local_name))
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] We do not sign or
encrypt security namespace headers");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_context] We
do not sign or encrypt security namespace headers");
return AXIS2_FAILURE;
}
@@ -1307,7 +1307,7 @@
}
else if(axutil_strcmp(local_name,"Security")==0)
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] We do not sign or
encrypt %s", local_name);
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_context] We
do not sign or encrypt %s", local_name);
return AXIS2_FAILURE;
}
else
@@ -1364,7 +1364,7 @@
if(axutil_strcmp(nspace, RP_SECURITY_NS)==0)
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] We do not sign or
encrypt security namespace elements");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_context] We
do not sign or encrypt security namespace elements");
return AXIS2_FAILURE;
}
@@ -1398,7 +1398,7 @@
{
if(axutil_strcmp(local_name,"Security")==0)
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] We do not
sign or encrypt %s", local_name);
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][rampart_context] We do not sign or encrypt %s", local_name);
return AXIS2_FAILURE;
}
else
@@ -2705,7 +2705,7 @@
if(!x509_token)
{
- AXIS2_LOG_INFO(env->log,"Cannot get the token value from policy.");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "Cannot get the token
value from policy.");
return NULL;
}
else
Modified: webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c Fri Apr
4 05:18:54 2008
@@ -151,7 +151,7 @@
status = oxs_axiom_interchange_nodes(env, sig_node, enc_key_node);
if(status!=AXIS2_SUCCESS)
{
- AXIS2_LOG_INFO(env->log,"[rampart][shb] Node interchange
failed.");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shb] Node
interchange failed.");
return status;
}
}
@@ -160,7 +160,7 @@
status = oxs_axiom_interchange_nodes(env, enc_key_node, sig_node);
if(status!=AXIS2_SUCCESS)
{
- AXIS2_LOG_INFO(env->log,"[rampart][shb] Node interchange
failed.");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shb] Node
interchange failed.");
return status;
}
}
Modified: webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c
(original)
+++ webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c Fri Apr
4 05:18:54 2008
@@ -214,7 +214,7 @@
str_node = oxs_axiom_get_first_child_node_by_name(env, key_info_node,
OXS_NODE_SECURITY_TOKEN_REFRENCE, OXS_WSSE_XMLNS, NULL);
if(!str_node)
{
- AXIS2_LOG_INFO(env->log, "[rampart][shp] Failed to get security token
reference node");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp] Failed to get
security token reference node");
return NULL;
}
@@ -229,19 +229,19 @@
ref_node = oxs_axiom_get_first_child_node_by_name(env, str_node,
OXS_NODE_KEY_IDENTIFIER, OXS_WSSE_XMLNS, NULL);
if(!ref_node)
{
- AXIS2_LOG_INFO(env->log, "[rampart][shp]Failed to get reference
node from security token reference");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp]Failed to
get reference node from security token reference");
return NULL;
}
value_type = oxs_axiom_get_attribute_value_of_node_by_name(env,
ref_node, OXS_ATTR_VALUE_TYPE, NULL);
if(axutil_strcmp(value_type, OXS_X509_ENCRYPTED_KEY_SHA1) != 0)
{
- AXIS2_LOG_INFO(env->log, "[rampart][shp]Failed to identify Key
Identifier %s", value_type);
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp]Failed to
identify Key Identifier %s", value_type);
return NULL;
}
given_hash = oxs_axiom_get_node_content(env, ref_node);
if(!given_hash)
{
- AXIS2_LOG_INFO(env->log, "[rampart][shp]Failed to get value of
EncryptedKeySHA1");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp]Failed to
get value of EncryptedKeySHA1");
return NULL;
}
@@ -270,7 +270,7 @@
if(!id)
{
- AXIS2_LOG_INFO(env->log, "[rampart][shp]Failed to get key name from
reference node");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp]Failed to get
key name from reference node");
return NULL;
}
@@ -1572,7 +1572,7 @@
session_key = rampart_shp_get_key_for_key_info(env, dk_node,
rampart_context, msg_ctx);
if(!session_key)
{
- AXIS2_LOG_INFO(env->log, "[rampart][shp] On processing derived key,
failed to get the session key. Cannot derive the key");
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp] On processing
derived key, failed to get the session key. Cannot derive the key");
return AXIS2_FAILURE;
}
Modified: webservices/rampart/trunk/c/src/util/rampart_username_token.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_username_token.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_username_token.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_username_token.c Fri Apr 4
05:18:54 2008
@@ -70,7 +70,7 @@
username = rampart_context_get_user(rampart_context, env);
if(!username)
{
- AXIS2_LOG_INFO(env->log,
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][rampart_usernametoken] User is not
specified.");
return AXIS2_FAILURE;
}
@@ -85,7 +85,7 @@
param = rampart_context_get_ctx(rampart_context, env);
if(!param)
{
- AXIS2_LOG_INFO(env->log,
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][rampart_usernametoken] Param is not
set.");
return AXIS2_FAILURE;
}
@@ -96,7 +96,7 @@
password_callback =
rampart_context_get_password_callback(rampart_context, env);
if(!password_callback)
{
- AXIS2_LOG_INFO(env->log,
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][rampart_usernametoken] password
callback module is not loaded. ERROR");
return AXIS2_FAILURE;
}
@@ -105,7 +105,7 @@
}
if (!password)
{
- AXIS2_LOG_INFO(env->log,
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart][rampart_usernametoken] Cannot find the
password for user %s. ERROR", username);
return AXIS2_FAILURE;
}
Modified: webservices/rampart/trunk/c/src/util/rampart_util.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_util.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_util.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_util.c Fri Apr 4 05:18:54 2008
@@ -67,7 +67,7 @@
if (!ptr)
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to load the
module %s. ERROR", module_name);
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util]
Unable to load the module %s. ERROR", module_name);
return NULL;
}
@@ -97,7 +97,7 @@
cred = (rampart_credentials_t*)rampart_load_module(env, cred_module_name,
¶m);
if (!cred)
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to identify
the credentials module %s. ERROR", cred_module_name);
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util]
Unable to identify the credentials module %s. ERROR", cred_module_name);
return AXIS2_FAILURE;
}
if(param){
@@ -117,7 +117,7 @@
authp = (rampart_authn_provider_t*)rampart_load_module(env,
auth_module_name, ¶m);
if (!authp)
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to identify
the authentication module %s. ERROR", auth_module_name);
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util]
Unable to identify the authentication module %s. ERROR", auth_module_name);
return AXIS2_FAILURE;
}
if(param){
@@ -137,7 +137,7 @@
rd = (rampart_replay_detector_t*)rampart_load_module(env,
replay_detector_name, ¶m);
if (!rd)
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to identify
the replay detection module %s. ERROR", replay_detector_name);
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util]
Unable to identify the replay detection module %s. ERROR",
replay_detector_name);
return AXIS2_FAILURE;
}
if(param){
@@ -157,7 +157,7 @@
sct_provider = (rampart_sct_provider_t*)rampart_load_module(env,
sct_provider_name, ¶m);
if (!sct_provider)
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to identify
the security context token provider module %s. ERROR", sct_provider_name);
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util]
Unable to identify the security context token provider module %s. ERROR",
sct_provider_name);
return AXIS2_FAILURE;
}
if(param)
@@ -178,7 +178,7 @@
cb = (rampart_callback_t*)rampart_load_module(env, callback_module_name,
¶m);
if (!cb)
{
- AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to identify
the callback module %s. ERROR", callback_module_name);
+ AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util]
Unable to identify the callback module %s. ERROR", callback_module_name);
if (param)
{
axutil_param_free(param, env);