Author: shankar
Date: Fri Apr  4 05:18:54 2008
New Revision: 644690

URL: http://svn.apache.org/viewvc?rev=644690&view=rev
Log:
error message changes

Modified:
    webservices/rampart/trunk/c/samples/sct_provider/sct_provider_hash_map.c
    webservices/rampart/trunk/c/samples/sct_provider/sct_provider_stored_key.c
    webservices/rampart/trunk/c/src/secconv/sct_provider.c
    webservices/rampart/trunk/c/src/secconv/security_context_token.c
    webservices/rampart/trunk/c/src/util/rampart_context.c
    webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c
    webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c
    webservices/rampart/trunk/c/src/util/rampart_username_token.c
    webservices/rampart/trunk/c/src/util/rampart_util.c

Modified: 
webservices/rampart/trunk/c/samples/sct_provider/sct_provider_hash_map.c
URL: 
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/samples/sct_provider/sct_provider_hash_map.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/samples/sct_provider/sct_provider_hash_map.c 
(original)
+++ webservices/rampart/trunk/c/samples/sct_provider/sct_provider_hash_map.c 
Fri Apr  4 05:18:54 2008
@@ -84,7 +84,7 @@
     sct_db = sct_provider_get_sct_hash(env, msg_ctx);
     if(!sct_db)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot find 
sct datastore");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] Cannot find sct datastore");
         return NULL;
     }
 
@@ -99,14 +99,14 @@
     /*check whether rp_property is valid*/
     if(!token)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] token 
property is not valid");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] token property is not valid");
         return NULL;
     }
 
     rp_sct = (rp_security_context_token_t*)rp_property_get_value(token, env);
     if(!rp_sct)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] value of 
token property is not valid");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] value of token property is not valid");
         return NULL;
     }
 
@@ -119,14 +119,14 @@
             axutil_hash_set(sct_db, sct_db_lable, AXIS2_HASH_KEY_STRING, sct);
 
         return sct;*/
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] 
SecurityContextToken assertion is not supported. Only SecureConversationToken 
assertion is supported by this module.");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] SecurityContextToken assertion is not 
supported. Only SecureConversationToken assertion is supported by this 
module.");
         return NULL;
     }
 
     /*so the token is secure conversation token. If client side then we can 
request from sts. If server side, can't do anything*/
     if(server_side)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot find 
security context token in server side");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] Cannot find security context token in server 
side");
         return NULL;
     }
     
@@ -161,7 +161,7 @@
 
     if (!(*inst))
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot 
initialize the sct provider module");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] Cannot initialize the sct provider module");
         return AXIS2_FAILURE;
     }
 
@@ -232,7 +232,7 @@
     rp_sct = (rp_security_context_token_t*)rp_property_get_value(token, env);
     if(!rp_sct)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] token 
property is not valid");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] token property is not valid");
         return NULL;
     }
 
@@ -240,7 +240,7 @@
     request the token from STS.*/
     if(!rp_security_context_token_get_is_secure_conversation_token(rp_sct, 
env))
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] token is not 
a secure conversation token.");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] token is not a secure conversation token.");
         return NULL;
     }
 
@@ -259,7 +259,7 @@
 
         if(!issuer_address)
         {
-            AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] issuer 
address is not valid.");
+            AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] issuer address is not valid.");
             return NULL;
         }
     }
@@ -268,7 +268,7 @@
     client_home = 
axis2_conf_get_repo(axis2_conf_ctx_get_conf(axis2_msg_ctx_get_conf_ctx(msg_ctx, 
env), env), env);
     if(!client_home)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot get 
client home");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] Cannot get client home");
         return NULL;
     }
 
@@ -309,7 +309,7 @@
     rstr = trust_context_get_rstr(trust_context, env);
     if(!rstr)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot get 
RSTR from STS");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] Cannot get RSTR from STS");
         return NULL;
     }
 
@@ -340,7 +340,7 @@
     sct = security_context_token_create(env);
     if(!sct)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot create 
security context token");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] Cannot create security context token");
         return NULL;
     }
 

Modified: 
webservices/rampart/trunk/c/samples/sct_provider/sct_provider_stored_key.c
URL: 
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/samples/sct_provider/sct_provider_stored_key.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/samples/sct_provider/sct_provider_stored_key.c 
(original)
+++ webservices/rampart/trunk/c/samples/sct_provider/sct_provider_stored_key.c 
Fri Apr  4 05:18:54 2008
@@ -81,7 +81,7 @@
     sct_db = sct_provider_get_sct_hash(env, msg_ctx);
     if(!sct_db)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot find 
sct datastore");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] Cannot find sct datastore");
         return NULL;
     }
 
@@ -122,7 +122,7 @@
 
     if (!(*inst))
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot 
initialize the sct provider module");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] Cannot initialize the sct provider module");
         return AXIS2_FAILURE;
     }
 
@@ -151,7 +151,7 @@
     sct = security_context_token_create(env);
     if(!sct)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider_sample] Cannot create 
security context token");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][sct_provider_sample] Cannot create security context token");
         return NULL;
     }
 

Modified: webservices/rampart/trunk/c/src/secconv/sct_provider.c
URL: 
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/secconv/sct_provider.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/secconv/sct_provider.c (original)
+++ webservices/rampart/trunk/c/src/secconv/sct_provider.c Fri Apr  4 05:18:54 
2008
@@ -39,7 +39,7 @@
     sct_provider = 
(rampart_sct_provider_t*)rampart_context_get_sct_provider(rampart_context, env);
     if(!sct_provider)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider] Security context 
token provider module is not set");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][sct_provider] 
Security context token provider module is not set");
         return NULL;
     }
 
@@ -48,7 +48,7 @@
 
     if(!sct)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][sct_provider] Security context 
token is not valid");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][sct_provider] 
Security context token is not valid");
     }
     
     return sct;

Modified: webservices/rampart/trunk/c/src/secconv/security_context_token.c
URL: 
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/secconv/security_context_token.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/secconv/security_context_token.c (original)
+++ webservices/rampart/trunk/c/src/secconv/security_context_token.c Fri Apr  4 
05:18:54 2008
@@ -172,7 +172,7 @@
 
     if(!sct->buffer)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Security 
context token does not have a shared secret");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,"[rampart][security context 
token] Security context token does not have a shared secret");
         return NULL;
     }
     
@@ -180,14 +180,14 @@
     proof_token_ele = axiom_element_create(env, NULL, 
TRUST_REQUESTED_PROOF_TOKEN, ns_obj_wst, &proof_token);
     if (!proof_token_ele)
        {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot 
create requested proof token");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Cannot create requested proof token");
         return NULL;
     }
 
     secret_ele = axiom_element_create(env, proof_token, TRUST_BINARY_SECRET, 
ns_obj_wst, &secret_node);
     if(!secret_ele)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot 
create binary secret token");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Cannot create binary secret token");
         return NULL;
     }
 
@@ -213,7 +213,7 @@
 
     if(!sct->local_id)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Security 
context token does not have a local identifier");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Security context token does not have a local identifier");
         return NULL;
     }
 
@@ -235,7 +235,7 @@
 
     if(!sct->global_id)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Security 
context token does not have a global identifier");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Security context token does not have a global identifier");
         return NULL;
     }
 
@@ -262,7 +262,7 @@
 
     if(!sct->global_id)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Security 
context token does not have an identifier.");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Security context token does not have an identifier.");
         return NULL;
     }
 
@@ -315,14 +315,14 @@
     /*secret_node = oxs_axiom_get_first_child_node_by_name(env, node, 
TRUST_BINARY_SECRET, TRUST_WST_XMLNS, NULL);
     if(!secret_node)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get 
binary secret node from proof token");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Cannot get binary secret node from proof token");
         return AXIS2_FAILURE;
     }*/
 
     shared_secret = oxs_axiom_get_node_content(env, node);
     if(!shared_secret)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get 
content of binary secret node");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Cannot get content of binary secret node");
         return AXIS2_FAILURE;
     }
     
@@ -352,14 +352,14 @@
     ref_token = oxs_axiom_get_first_child_node_by_name(env, node, 
OXS_NODE_REFERENCE, OXS_WSSE_XMLNS, NULL);
     if(!ref_token)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get 
reference node from attached reference");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Cannot get reference node from attached reference");
         return AXIS2_FAILURE;
     }
 
     local_id = oxs_token_get_reference(env, ref_token);
     if(!local_id)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get 
attached reference");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Cannot get attached reference");
         return AXIS2_FAILURE;
     }
     
@@ -382,14 +382,14 @@
     ref_token = oxs_axiom_get_first_child_node_by_name(env, node, 
OXS_NODE_REFERENCE, OXS_WSSE_XMLNS, NULL);
     if(!ref_token)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get 
reference node from unattached reference");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Cannot get reference node from unattached reference");
         return AXIS2_FAILURE;
     }
 
     reference_id = oxs_token_get_reference(env, ref_token);
     if(!reference_id)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][security context token] Cannot get 
unattached reference");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][security context 
token] Cannot get unattached reference");
         return AXIS2_FAILURE;
     }
     

Modified: webservices/rampart/trunk/c/src/util/rampart_context.c
URL: 
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_context.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_context.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_context.c Fri Apr  4 05:18:54 
2008
@@ -1274,7 +1274,7 @@
     /*if(axutil_strcmp(nspace, RP_SECURITY_NS)==0)*/
     if((axutil_strcmp(nspace, RP_SECURITY_NS)==0) && (!local_name))
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] We do not sign or 
encrypt security namespace headers");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_context] We 
do not sign or encrypt security namespace headers");
         return AXIS2_FAILURE;
     }
 
@@ -1307,7 +1307,7 @@
     }
     else if(axutil_strcmp(local_name,"Security")==0)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] We do not sign or 
encrypt %s", local_name);
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_context] We 
do not sign or encrypt %s", local_name);
         return AXIS2_FAILURE;
     }
     else
@@ -1364,7 +1364,7 @@
 
     if(axutil_strcmp(nspace, RP_SECURITY_NS)==0)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] We do not sign or 
encrypt security namespace elements");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_context] We 
do not sign or encrypt security namespace elements");
         return AXIS2_FAILURE;
     }
 
@@ -1398,7 +1398,7 @@
     {
         if(axutil_strcmp(local_name,"Security")==0)
         {
-            AXIS2_LOG_INFO(env->log, "[rampart][rampart_context] We do not 
sign or encrypt %s", local_name);
+            AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, 
"[rampart][rampart_context] We do not sign or encrypt %s", local_name);
             return AXIS2_FAILURE;
         }
         else
@@ -2705,7 +2705,7 @@
 
         if(!x509_token)
         {
-            AXIS2_LOG_INFO(env->log,"Cannot get the token value from policy.");
+            AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "Cannot get the token 
value from policy.");
             return NULL;
         }
         else

Modified: webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c
URL: 
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_sec_header_builder.c Fri Apr  
4 05:18:54 2008
@@ -151,7 +151,7 @@
             status = oxs_axiom_interchange_nodes(env, sig_node, enc_key_node);
             if(status!=AXIS2_SUCCESS)
             {
-                AXIS2_LOG_INFO(env->log,"[rampart][shb] Node interchange 
failed.");
+                AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shb] Node 
interchange failed.");
                 return status;
             }
         }
@@ -160,7 +160,7 @@
             status = oxs_axiom_interchange_nodes(env, enc_key_node, sig_node);
             if(status!=AXIS2_SUCCESS)
             {
-                AXIS2_LOG_INFO(env->log,"[rampart][shb] Node interchange 
failed.");
+                AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shb] Node 
interchange failed.");
                 return status;
             }
         }

Modified: webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c
URL: 
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c 
(original)
+++ webservices/rampart/trunk/c/src/util/rampart_sec_header_processor.c Fri Apr 
 4 05:18:54 2008
@@ -214,7 +214,7 @@
     str_node = oxs_axiom_get_first_child_node_by_name(env, key_info_node, 
OXS_NODE_SECURITY_TOKEN_REFRENCE, OXS_WSSE_XMLNS, NULL);
     if(!str_node)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][shp] Failed to get security token 
reference node");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp] Failed to get 
security token reference node");
         return NULL;
     }
 
@@ -229,19 +229,19 @@
         ref_node = oxs_axiom_get_first_child_node_by_name(env, str_node, 
OXS_NODE_KEY_IDENTIFIER, OXS_WSSE_XMLNS, NULL);
         if(!ref_node)
         {
-            AXIS2_LOG_INFO(env->log, "[rampart][shp]Failed to get reference 
node from security token reference");
+            AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp]Failed to 
get reference node from security token reference");
             return NULL;
         }
         value_type = oxs_axiom_get_attribute_value_of_node_by_name(env, 
ref_node, OXS_ATTR_VALUE_TYPE, NULL);
         if(axutil_strcmp(value_type, OXS_X509_ENCRYPTED_KEY_SHA1) != 0)
         {
-            AXIS2_LOG_INFO(env->log, "[rampart][shp]Failed to identify Key 
Identifier %s", value_type);
+            AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp]Failed to 
identify Key Identifier %s", value_type);
             return NULL;
         }
         given_hash = oxs_axiom_get_node_content(env, ref_node);
         if(!given_hash)
         {
-            AXIS2_LOG_INFO(env->log, "[rampart][shp]Failed to get value of 
EncryptedKeySHA1");
+            AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp]Failed to 
get value of EncryptedKeySHA1");
             return NULL;
         }
 
@@ -270,7 +270,7 @@
 
     if(!id)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][shp]Failed to get key name from 
reference node");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][shp]Failed to get 
key name from reference node");
         return NULL;
     }
     
@@ -1572,7 +1572,7 @@
     session_key = rampart_shp_get_key_for_key_info(env, dk_node, 
rampart_context, msg_ctx);
     if(!session_key)
     {
-        AXIS2_LOG_INFO(env->log,  "[rampart][shp] On processing derived key, 
failed to get the session key. Cannot derive the key");
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,  "[rampart][shp] On processing 
derived key, failed to get the session key. Cannot derive the key");
         return AXIS2_FAILURE;
     }
 

Modified: webservices/rampart/trunk/c/src/util/rampart_username_token.c
URL: 
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_username_token.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_username_token.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_username_token.c Fri Apr  4 
05:18:54 2008
@@ -70,7 +70,7 @@
     username = rampart_context_get_user(rampart_context, env);
     if(!username)
     {
-        AXIS2_LOG_INFO(env->log,
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
                        "[rampart][rampart_usernametoken] User is not 
specified.");
         return AXIS2_FAILURE;
     }
@@ -85,7 +85,7 @@
             param = rampart_context_get_ctx(rampart_context, env);
             if(!param)
             {
-                AXIS2_LOG_INFO(env->log,
+                AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
                                "[rampart][rampart_usernametoken] Param is not 
set.");
                 return AXIS2_FAILURE;
             }
@@ -96,7 +96,7 @@
             password_callback = 
rampart_context_get_password_callback(rampart_context, env);
             if(!password_callback)
             {
-                AXIS2_LOG_INFO(env->log,
+                AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
                                "[rampart][rampart_usernametoken] password 
callback module is not loaded. ERROR");
                 return AXIS2_FAILURE;
             }
@@ -105,7 +105,7 @@
     }
     if (!password)
     {
-        AXIS2_LOG_INFO(env->log,
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
                        "[rampart][rampart_usernametoken] Cannot find the 
password for user %s. ERROR", username);
         return AXIS2_FAILURE;
     }

Modified: webservices/rampart/trunk/c/src/util/rampart_util.c
URL: 
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/util/rampart_util.c?rev=644690&r1=644689&r2=644690&view=diff
==============================================================================
--- webservices/rampart/trunk/c/src/util/rampart_util.c (original)
+++ webservices/rampart/trunk/c/src/util/rampart_util.c Fri Apr  4 05:18:54 2008
@@ -67,7 +67,7 @@
 
     if (!ptr)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to load the 
module %s. ERROR", module_name);
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util] 
Unable to load the module %s. ERROR", module_name);
         return NULL;
     }
 
@@ -97,7 +97,7 @@
     cred = (rampart_credentials_t*)rampart_load_module(env, cred_module_name, 
&param);
     if (!cred)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to identify 
the credentials  module %s. ERROR", cred_module_name);
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util] 
Unable to identify the credentials  module %s. ERROR", cred_module_name);
         return AXIS2_FAILURE;
     }
     if(param){
@@ -117,7 +117,7 @@
     authp = (rampart_authn_provider_t*)rampart_load_module(env, 
auth_module_name, &param);
     if (!authp)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to identify 
the authentication module %s. ERROR", auth_module_name);
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util] 
Unable to identify the authentication module %s. ERROR", auth_module_name);
         return AXIS2_FAILURE;
     }
     if(param){
@@ -137,7 +137,7 @@
     rd = (rampart_replay_detector_t*)rampart_load_module(env, 
replay_detector_name, &param);
     if (!rd)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to identify 
the replay detection  module %s. ERROR", replay_detector_name);
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util] 
Unable to identify the replay detection  module %s. ERROR", 
replay_detector_name);
         return AXIS2_FAILURE;
     }
     if(param){
@@ -157,7 +157,7 @@
     sct_provider = (rampart_sct_provider_t*)rampart_load_module(env, 
sct_provider_name, &param);
     if (!sct_provider)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to identify 
the security context token provider module %s. ERROR", sct_provider_name);
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util] 
Unable to identify the security context token provider module %s. ERROR", 
sct_provider_name);
         return AXIS2_FAILURE;
     }
     if(param)
@@ -178,7 +178,7 @@
     cb = (rampart_callback_t*)rampart_load_module(env, callback_module_name, 
&param);
     if (!cb)
     {
-        AXIS2_LOG_INFO(env->log, "[rampart][rampart_util] Unable to identify 
the callback module %s. ERROR", callback_module_name);
+        AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart][rampart_util] 
Unable to identify the callback module %s. ERROR", callback_module_name);
         if (param)
         {
                        axutil_param_free(param, env);


Reply via email to