Modified: 
webservices/wss4j/site/xref/org/apache/ws/security/str/DerivedKeyTokenSTRParser.html
URL: 
http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/str/DerivedKeyTokenSTRParser.html?rev=1178426&r1=1178425&r2=1178426&view=diff
==============================================================================
--- 
webservices/wss4j/site/xref/org/apache/ws/security/str/DerivedKeyTokenSTRParser.html
 (original)
+++ 
webservices/wss4j/site/xref/org/apache/ws/security/str/DerivedKeyTokenSTRParser.html
 Mon Oct  3 15:15:52 2011
@@ -37,215 +37,259 @@
 <a name="27" href="#27">27</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.WSSecurityException;
 <a name="28" href="#28">28</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.components.crypto.Crypto;
 <a name="29" href="#29">29</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.handler.RequestData;
-<a name="30" href="#30">30</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.message.token.SecurityTokenReference;
-<a name="31" href="#31">31</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.message.token.UsernameToken;
-<a name="32" href="#32">32</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.saml.SAMLKeyInfo;
-<a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.saml.SAMLUtil;
-<a name="34" href="#34">34</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.saml.ext.AssertionWrapper;
-<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> 
org.w3c.dom.Element;
-<a name="36" href="#36">36</a>  
-<a name="37" href="#37">37</a>  <strong class="jxr_keyword">import</strong> 
java.security.Principal;
-<a name="38" href="#38">38</a>  <strong class="jxr_keyword">import</strong> 
java.security.PublicKey;
-<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> 
java.security.cert.X509Certificate;
-<a name="40" href="#40">40</a>  <strong class="jxr_keyword">import</strong> 
java.util.Map;
-<a name="41" href="#41">41</a>  
-<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> 
javax.security.auth.callback.Callback;
-<a name="43" href="#43">43</a>  
-<a name="44" href="#44">44</a>  <em class="jxr_javadoccomment">/**</em>
-<a name="45" href="#45">45</a>  <em class="jxr_javadoccomment"> * This 
implementation of STRParser is for parsing a SecurityTokenReference element 
associated</em>
-<a name="46" href="#46">46</a>  <em class="jxr_javadoccomment"> * with a 
DerivedKeyToken element.</em>
-<a name="47" href="#47">47</a>  <em class="jxr_javadoccomment"> */</em>
-<a name="48" href="#48">48</a>  <strong class="jxr_keyword">public</strong> 
<strong class="jxr_keyword">class</strong> <a 
href="../../../../../org/apache/ws/security/str/DerivedKeyTokenSTRParser.html">DerivedKeyTokenSTRParser</a>
 implements <a 
href="../../../../../org/apache/ws/security/str/STRParser.html">STRParser</a> {
-<a name="49" href="#49">49</a>      
-<a name="50" href="#50">50</a>      <strong 
class="jxr_keyword">private</strong> byte[] secretKey;
-<a name="51" href="#51">51</a>      
-<a name="52" href="#52">52</a>      <em class="jxr_javadoccomment">/**</em>
-<a name="53" href="#53">53</a>  <em class="jxr_javadoccomment">     * Parse a 
SecurityTokenReference element and extract credentials.</em>
-<a name="54" href="#54">54</a>  <em class="jxr_javadoccomment">     * </em>
-<a name="55" href="#55">55</a>  <em class="jxr_javadoccomment">     * @param 
strElement The SecurityTokenReference element</em>
-<a name="56" href="#56">56</a>  <em class="jxr_javadoccomment">     * @param 
data the RequestData associated with the request</em>
-<a name="57" href="#57">57</a>  <em class="jxr_javadoccomment">     * @param 
wsDocInfo The WSDocInfo object to access previous processing results</em>
-<a name="58" href="#58">58</a>  <em class="jxr_javadoccomment">     * @param 
parameters A set of implementation-specific parameters</em>
-<a name="59" href="#59">59</a>  <em class="jxr_javadoccomment">     * @throws 
WSSecurityException</em>
-<a name="60" href="#60">60</a>  <em class="jxr_javadoccomment">     */</em>
-<a name="61" href="#61">61</a>      <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
parseSecurityTokenReference(
-<a name="62" href="#62">62</a>          Element strElement,
-<a name="63" href="#63">63</a>          <a 
href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a>
 data,
-<a name="64" href="#64">64</a>          <a 
href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> 
wsDocInfo,
-<a name="65" href="#65">65</a>          Map&lt;String, Object&gt; parameters
-<a name="66" href="#66">66</a>      ) <strong 
class="jxr_keyword">throws</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>
 {
-<a name="67" href="#67">67</a>          <strong 
class="jxr_keyword">boolean</strong> bspCompliant = <strong 
class="jxr_keyword">true</strong>;
-<a name="68" href="#68">68</a>          <a 
href="../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a>
 crypto = data.getDecCrypto();
-<a name="69" href="#69">69</a>          <a 
href="../../../../../org/apache/ws/security/WSSConfig.html">WSSConfig</a> 
config = data.getWssConfig();
-<a name="70" href="#70">70</a>  
-<a name="71" href="#71">71</a>          <strong 
class="jxr_keyword">if</strong> (config != <strong 
class="jxr_keyword">null</strong>) {
-<a name="72" href="#72">72</a>              bspCompliant = 
config.isWsiBSPCompliant();
-<a name="73" href="#73">73</a>          }
-<a name="74" href="#74">74</a>          
-<a name="75" href="#75">75</a>          <a 
href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>
 secRef = <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(strElement,
 bspCompliant);
-<a name="76" href="#76">76</a>          
-<a name="77" href="#77">77</a>          String uri = <strong 
class="jxr_keyword">null</strong>;
-<a name="78" href="#78">78</a>          <strong 
class="jxr_keyword">if</strong> (secRef.containsReference()) {
-<a name="79" href="#79">79</a>              uri = 
secRef.getReference().getURI();
-<a name="80" href="#80">80</a>              <strong 
class="jxr_keyword">if</strong> (uri.charAt(0) == '#') {
-<a name="81" href="#81">81</a>                  uri = uri.substring(1);
-<a name="82" href="#82">82</a>              }
-<a name="83" href="#83">83</a>          } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(secRef.containsKeyIdentifier()) {
-<a name="84" href="#84">84</a>              uri = 
secRef.getKeyIdentifierValue();
-<a name="85" href="#85">85</a>          }
-<a name="86" href="#86">86</a>          
-<a name="87" href="#87">87</a>          <a 
href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a>
 result = wsDocInfo.getResult(uri);
-<a name="88" href="#88">88</a>          <strong 
class="jxr_keyword">if</strong> (result != <strong 
class="jxr_keyword">null</strong>) {
-<a name="89" href="#89">89</a>              processPreviousResult(result, 
secRef, data, wsDocInfo, bspCompliant);
-<a name="90" href="#90">90</a>          } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(secRef.containsReference()) { 
-<a name="91" href="#91">91</a>              <em class="jxr_comment">// Now use 
the callback and get it</em>
-<a name="92" href="#92">92</a>              secretKey = 
-<a name="93" href="#93">93</a>                  getSecretKeyFromToken(uri, 
<strong class="jxr_keyword">null</strong>, 
WSPasswordCallback.SECURITY_CONTEXT_TOKEN, data);
-<a name="94" href="#94">94</a>          } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(secRef.containsKeyIdentifier()) {
-<a name="95" href="#95">95</a>              String keyIdentifierValueType = 
secRef.getKeyIdentifierValueType();
-<a name="96" href="#96">96</a>              <strong 
class="jxr_keyword">if</strong> (bspCompliant 
-<a name="97" href="#97">97</a>                  &amp;&amp; 
keyIdentifierValueType.equals(SecurityTokenReference.ENC_KEY_SHA1_URI)) {
-<a name="98" href="#98">98</a>                  
BSPEnforcer.checkEncryptedKeyBSPCompliance(secRef);
-<a name="99" href="#99">99</a>              }
-<a name="100" href="#100">100</a>             X509Certificate[] certs = 
secRef.getKeyIdentifier(crypto);
-<a name="101" href="#101">101</a>             <strong 
class="jxr_keyword">if</strong> (certs == <strong 
class="jxr_keyword">null</strong> || certs.length &lt; 1 || certs[0] == <strong 
class="jxr_keyword">null</strong>) {
-<a name="102" href="#102">102</a>                 secretKey = 
-<a name="103" href="#103">103</a>                     <strong 
class="jxr_keyword">this</strong>.getSecretKeyFromToken(
-<a name="104" href="#104">104</a>                         
secRef.getKeyIdentifierValue(), keyIdentifierValueType, 
-<a name="105" href="#105">105</a>                         
WSPasswordCallback.SECRET_KEY, data
-<a name="106" href="#106">106</a>                    ); 
-<a name="107" href="#107">107</a>             } <strong 
class="jxr_keyword">else</strong> {
-<a name="108" href="#108">108</a>                 secretKey = 
crypto.getPrivateKey(certs[0], data.getCallbackHandler()).getEncoded();
-<a name="109" href="#109">109</a>             }
-<a name="110" href="#110">110</a>         } <strong 
class="jxr_keyword">else</strong> {
-<a name="111" href="#111">111</a>             <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="112" href="#112">112</a>                 
WSSecurityException.FAILED_CHECK, <span 
class="jxr_string">"unsupportedKeyId"</span>
-<a name="113" href="#113">113</a>             );
-<a name="114" href="#114">114</a>         }
-<a name="115" href="#115">115</a>     }
-<a name="116" href="#116">116</a>     
-<a name="117" href="#117">117</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="118" href="#118">118</a> <em class="jxr_javadoccomment">     * Get 
the X509Certificates associated with this SecurityTokenReference</em>
-<a name="119" href="#119">119</a> <em class="jxr_javadoccomment">     * 
@return the X509Certificates associated with this SecurityTokenReference</em>
-<a name="120" href="#120">120</a> <em class="jxr_javadoccomment">     */</em>
-<a name="121" href="#121">121</a>     <strong 
class="jxr_keyword">public</strong> X509Certificate[] getCertificates() {
-<a name="122" href="#122">122</a>         <strong 
class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="123" href="#123">123</a>     }
-<a name="124" href="#124">124</a>     
-<a name="125" href="#125">125</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="126" href="#126">126</a> <em class="jxr_javadoccomment">     * Get 
the Principal associated with this SecurityTokenReference</em>
-<a name="127" href="#127">127</a> <em class="jxr_javadoccomment">     * 
@return the Principal associated with this SecurityTokenReference</em>
-<a name="128" href="#128">128</a> <em class="jxr_javadoccomment">     */</em>
-<a name="129" href="#129">129</a>     <strong 
class="jxr_keyword">public</strong> Principal getPrincipal() {
-<a name="130" href="#130">130</a>         <strong 
class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="131" href="#131">131</a>     }
-<a name="132" href="#132">132</a>     
-<a name="133" href="#133">133</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="134" href="#134">134</a> <em class="jxr_javadoccomment">     * Get 
the PublicKey associated with this SecurityTokenReference</em>
-<a name="135" href="#135">135</a> <em class="jxr_javadoccomment">     * 
@return the PublicKey associated with this SecurityTokenReference</em>
-<a name="136" href="#136">136</a> <em class="jxr_javadoccomment">     */</em>
-<a name="137" href="#137">137</a>     <strong 
class="jxr_keyword">public</strong> PublicKey getPublicKey() {
-<a name="138" href="#138">138</a>         <strong 
class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="139" href="#139">139</a>     }
-<a name="140" href="#140">140</a>     
-<a name="141" href="#141">141</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="142" href="#142">142</a> <em class="jxr_javadoccomment">     * Get 
the Secret Key associated with this SecurityTokenReference</em>
-<a name="143" href="#143">143</a> <em class="jxr_javadoccomment">     * 
@return the Secret Key associated with this SecurityTokenReference</em>
-<a name="144" href="#144">144</a> <em class="jxr_javadoccomment">     */</em>
-<a name="145" href="#145">145</a>     <strong 
class="jxr_keyword">public</strong> byte[] getSecretKey() {
-<a name="146" href="#146">146</a>         <strong 
class="jxr_keyword">return</strong> secretKey;
-<a name="147" href="#147">147</a>     }
-<a name="148" href="#148">148</a>     
-<a name="149" href="#149">149</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="150" href="#150">150</a> <em class="jxr_javadoccomment">     * Get 
whether the returned credential is already trusted or not. This is 
currently</em>
-<a name="151" href="#151">151</a> <em class="jxr_javadoccomment">     * 
applicable in the case of a credential extracted from a trusted HOK SAML 
Assertion,</em>
-<a name="152" href="#152">152</a> <em class="jxr_javadoccomment">     * and a 
BinarySecurityToken that has been processed by a Validator. In these cases,</em>
-<a name="153" href="#153">153</a> <em class="jxr_javadoccomment">     * the 
SignatureProcessor does not need to verify trust on the credential.</em>
-<a name="154" href="#154">154</a> <em class="jxr_javadoccomment">     * 
@return true if trust has already been verified on the returned Credential</em>
-<a name="155" href="#155">155</a> <em class="jxr_javadoccomment">     */</em>
-<a name="156" href="#156">156</a>     <strong 
class="jxr_keyword">public</strong> <strong 
class="jxr_keyword">boolean</strong> isTrustedCredential() {
-<a name="157" href="#157">157</a>         <strong 
class="jxr_keyword">return</strong> false;
-<a name="158" href="#158">158</a>     }
-<a name="159" href="#159">159</a> 
-<a name="160" href="#160">160</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="161" href="#161">161</a> <em class="jxr_javadoccomment">     * Get 
the Secret Key from a CallbackHandler</em>
-<a name="162" href="#162">162</a> <em class="jxr_javadoccomment">     * @param 
id The id of the element</em>
-<a name="163" href="#163">163</a> <em class="jxr_javadoccomment">     * @param 
type The type of the element (may be null)</em>
-<a name="164" href="#164">164</a> <em class="jxr_javadoccomment">     * @param 
cb The CallbackHandler object</em>
-<a name="165" href="#165">165</a> <em class="jxr_javadoccomment">     * 
@return A Secret Key</em>
-<a name="166" href="#166">166</a> <em class="jxr_javadoccomment">     * 
@throws WSSecurityException</em>
-<a name="167" href="#167">167</a> <em class="jxr_javadoccomment">     */</em>
-<a name="168" href="#168">168</a>     <strong 
class="jxr_keyword">private</strong> byte[] getSecretKeyFromToken(
-<a name="169" href="#169">169</a>         String id,
-<a name="170" href="#170">170</a>         String type,
-<a name="171" href="#171">171</a>         <strong 
class="jxr_keyword">int</strong> identifier,
-<a name="172" href="#172">172</a>         <a 
href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a>
 data
-<a name="173" href="#173">173</a>     ) <strong 
class="jxr_keyword">throws</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>
 {
-<a name="174" href="#174">174</a>         <strong 
class="jxr_keyword">if</strong> (id.charAt(0) == '#') {
-<a name="175" href="#175">175</a>             id = id.substring(1);
-<a name="176" href="#176">176</a>         }
-<a name="177" href="#177">177</a>         <a 
href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>
 pwcb = 
-<a name="178" href="#178">178</a>             <strong 
class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>(id,
 <strong class="jxr_keyword">null</strong>, type, identifier, data);
-<a name="179" href="#179">179</a>         <strong 
class="jxr_keyword">try</strong> {
-<a name="180" href="#180">180</a>             Callback[] callbacks = <strong 
class="jxr_keyword">new</strong> Callback[]{pwcb};
-<a name="181" href="#181">181</a>             
data.getCallbackHandler().handle(callbacks);
-<a name="182" href="#182">182</a>         } <strong 
class="jxr_keyword">catch</strong> (Exception e) {
-<a name="183" href="#183">183</a>             <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="184" href="#184">184</a>                 WSSecurityException.FAILURE,
-<a name="185" href="#185">185</a>                 <span 
class="jxr_string">"noPassword"</span>, 
-<a name="186" href="#186">186</a>                 <strong 
class="jxr_keyword">new</strong> Object[] {id}, 
-<a name="187" href="#187">187</a>                 e
-<a name="188" href="#188">188</a>             );
-<a name="189" href="#189">189</a>         }
-<a name="190" href="#190">190</a> 
-<a name="191" href="#191">191</a>         <strong 
class="jxr_keyword">return</strong> pwcb.getKey();
-<a name="192" href="#192">192</a>     }
-<a name="193" href="#193">193</a>     
-<a name="194" href="#194">194</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="195" href="#195">195</a> <em class="jxr_javadoccomment">     * 
Process a previous security result</em>
+<a name="30" href="#30">30</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.message.token.BinarySecurity;
+<a name="31" href="#31">31</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.message.token.SecurityTokenReference;
+<a name="32" href="#32">32</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.message.token.UsernameToken;
+<a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.saml.SAMLKeyInfo;
+<a name="34" href="#34">34</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.saml.SAMLUtil;
+<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.saml.ext.AssertionWrapper;
+<a name="36" href="#36">36</a>  <strong class="jxr_keyword">import</strong> 
org.apache.ws.security.util.WSSecurityUtil;
+<a name="37" href="#37">37</a>  <strong class="jxr_keyword">import</strong> 
org.w3c.dom.Element;
+<a name="38" href="#38">38</a>  
+<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> 
java.security.Principal;
+<a name="40" href="#40">40</a>  <strong class="jxr_keyword">import</strong> 
java.security.PublicKey;
+<a name="41" href="#41">41</a>  <strong class="jxr_keyword">import</strong> 
java.security.cert.X509Certificate;
+<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> 
java.util.Arrays;
+<a name="43" href="#43">43</a>  <strong class="jxr_keyword">import</strong> 
java.util.List;
+<a name="44" href="#44">44</a>  <strong class="jxr_keyword">import</strong> 
java.util.Map;
+<a name="45" href="#45">45</a>  
+<a name="46" href="#46">46</a>  <strong class="jxr_keyword">import</strong> 
javax.security.auth.callback.Callback;
+<a name="47" href="#47">47</a>  
+<a name="48" href="#48">48</a>  <em class="jxr_javadoccomment">/**</em>
+<a name="49" href="#49">49</a>  <em class="jxr_javadoccomment"> * This 
implementation of STRParser is for parsing a SecurityTokenReference element 
associated</em>
+<a name="50" href="#50">50</a>  <em class="jxr_javadoccomment"> * with a 
DerivedKeyToken element.</em>
+<a name="51" href="#51">51</a>  <em class="jxr_javadoccomment"> */</em>
+<a name="52" href="#52">52</a>  <strong class="jxr_keyword">public</strong> 
<strong class="jxr_keyword">class</strong> <a 
href="../../../../../org/apache/ws/security/str/DerivedKeyTokenSTRParser.html">DerivedKeyTokenSTRParser</a>
 implements <a 
href="../../../../../org/apache/ws/security/str/STRParser.html">STRParser</a> {
+<a name="53" href="#53">53</a>      
+<a name="54" href="#54">54</a>      <strong 
class="jxr_keyword">private</strong> byte[] secretKey;
+<a name="55" href="#55">55</a>      
+<a name="56" href="#56">56</a>      <em class="jxr_javadoccomment">/**</em>
+<a name="57" href="#57">57</a>  <em class="jxr_javadoccomment">     * Parse a 
SecurityTokenReference element and extract credentials.</em>
+<a name="58" href="#58">58</a>  <em class="jxr_javadoccomment">     * </em>
+<a name="59" href="#59">59</a>  <em class="jxr_javadoccomment">     * @param 
strElement The SecurityTokenReference element</em>
+<a name="60" href="#60">60</a>  <em class="jxr_javadoccomment">     * @param 
data the RequestData associated with the request</em>
+<a name="61" href="#61">61</a>  <em class="jxr_javadoccomment">     * @param 
wsDocInfo The WSDocInfo object to access previous processing results</em>
+<a name="62" href="#62">62</a>  <em class="jxr_javadoccomment">     * @param 
parameters A set of implementation-specific parameters</em>
+<a name="63" href="#63">63</a>  <em class="jxr_javadoccomment">     * @throws 
WSSecurityException</em>
+<a name="64" href="#64">64</a>  <em class="jxr_javadoccomment">     */</em>
+<a name="65" href="#65">65</a>      <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
parseSecurityTokenReference(
+<a name="66" href="#66">66</a>          Element strElement,
+<a name="67" href="#67">67</a>          <a 
href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a>
 data,
+<a name="68" href="#68">68</a>          <a 
href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> 
wsDocInfo,
+<a name="69" href="#69">69</a>          Map&lt;String, Object&gt; parameters
+<a name="70" href="#70">70</a>      ) <strong 
class="jxr_keyword">throws</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>
 {
+<a name="71" href="#71">71</a>          <strong 
class="jxr_keyword">boolean</strong> bspCompliant = <strong 
class="jxr_keyword">true</strong>;
+<a name="72" href="#72">72</a>          <a 
href="../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a>
 crypto = data.getDecCrypto();
+<a name="73" href="#73">73</a>          <a 
href="../../../../../org/apache/ws/security/WSSConfig.html">WSSConfig</a> 
config = data.getWssConfig();
+<a name="74" href="#74">74</a>  
+<a name="75" href="#75">75</a>          <strong 
class="jxr_keyword">if</strong> (config != <strong 
class="jxr_keyword">null</strong>) {
+<a name="76" href="#76">76</a>              bspCompliant = 
config.isWsiBSPCompliant();
+<a name="77" href="#77">77</a>          }
+<a name="78" href="#78">78</a>          
+<a name="79" href="#79">79</a>          <a 
href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>
 secRef = <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(strElement,
 bspCompliant);
+<a name="80" href="#80">80</a>          
+<a name="81" href="#81">81</a>          String uri = <strong 
class="jxr_keyword">null</strong>;
+<a name="82" href="#82">82</a>          <strong 
class="jxr_keyword">if</strong> (secRef.containsReference()) {
+<a name="83" href="#83">83</a>              uri = 
secRef.getReference().getURI();
+<a name="84" href="#84">84</a>              <strong 
class="jxr_keyword">if</strong> (uri.charAt(0) == '#') {
+<a name="85" href="#85">85</a>                  uri = uri.substring(1);
+<a name="86" href="#86">86</a>              }
+<a name="87" href="#87">87</a>          } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(secRef.containsKeyIdentifier()) {
+<a name="88" href="#88">88</a>              uri = 
secRef.getKeyIdentifierValue();
+<a name="89" href="#89">89</a>          }
+<a name="90" href="#90">90</a>          
+<a name="91" href="#91">91</a>          <a 
href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a>
 result = wsDocInfo.getResult(uri);
+<a name="92" href="#92">92</a>          <strong 
class="jxr_keyword">if</strong> (result != <strong 
class="jxr_keyword">null</strong>) {
+<a name="93" href="#93">93</a>              processPreviousResult(result, 
secRef, data, wsDocInfo, bspCompliant);
+<a name="94" href="#94">94</a>          } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(secRef.containsReference()) { 
+<a name="95" href="#95">95</a>              <em class="jxr_comment">// Now use 
the callback and get it</em>
+<a name="96" href="#96">96</a>              secretKey = 
+<a name="97" href="#97">97</a>                  getSecretKeyFromToken(uri, 
<strong class="jxr_keyword">null</strong>, 
WSPasswordCallback.SECURITY_CONTEXT_TOKEN, data);
+<a name="98" href="#98">98</a>              <strong 
class="jxr_keyword">if</strong> (secretKey == <strong 
class="jxr_keyword">null</strong>) {
+<a name="99" href="#99">99</a>                  <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="100" href="#100">100</a>                     
WSSecurityException.FAILED_CHECK, <span 
class="jxr_string">"unsupportedKeyId"</span>, <strong 
class="jxr_keyword">new</strong> Object[] {uri}
+<a name="101" href="#101">101</a>                 );
+<a name="102" href="#102">102</a>             }
+<a name="103" href="#103">103</a>         } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(secRef.containsKeyIdentifier()) {
+<a name="104" href="#104">104</a>             String keyIdentifierValueType = 
secRef.getKeyIdentifierValueType();
+<a name="105" href="#105">105</a>             <strong 
class="jxr_keyword">if</strong> 
(WSConstants.WSS_KRB_KI_VALUE_TYPE.equals(keyIdentifierValueType)) {
+<a name="106" href="#106">106</a>                 secretKey = 
+<a name="107" href="#107">107</a>                     getSecretKeyFromToken(
+<a name="108" href="#108">108</a>                         
secRef.getKeyIdentifierValue(), keyIdentifierValueType, 
+<a name="109" href="#109">109</a>                         
WSPasswordCallback.SECRET_KEY, data
+<a name="110" href="#110">110</a>                     );
+<a name="111" href="#111">111</a>                 <strong 
class="jxr_keyword">if</strong> (secretKey == <strong 
class="jxr_keyword">null</strong>) {
+<a name="112" href="#112">112</a>                     byte[] keyBytes = 
secRef.getSKIBytes();
+<a name="113" href="#113">113</a>                     
List&lt;WSSecurityEngineResult&gt; resultsList = 
+<a name="114" href="#114">114</a>                         
wsDocInfo.getResultsByTag(WSConstants.BST);
+<a name="115" href="#115">115</a>                     <strong 
class="jxr_keyword">for</strong> (WSSecurityEngineResult bstResult : 
resultsList) {
+<a name="116" href="#116">116</a>                         <a 
href="../../../../../org/apache/ws/security/message/token/BinarySecurity.html">BinarySecurity</a>
 bstToken = 
+<a name="117" href="#117">117</a>                             (<a 
href="../../../../../org/apache/ws/security/message/token/BinarySecurity.html">BinarySecurity</a>)bstResult.get(WSSecurityEngineResult.TAG_BINARY_SECURITY_TOKEN);
+<a name="118" href="#118">118</a>                         byte[] tokenDigest = 
WSSecurityUtil.generateDigest(bstToken.getToken());
+<a name="119" href="#119">119</a>                         <strong 
class="jxr_keyword">if</strong> (Arrays.equals(tokenDigest, keyBytes)) {
+<a name="120" href="#120">120</a>                             secretKey = 
(byte[])bstResult.get(WSSecurityEngineResult.TAG_SECRET);
+<a name="121" href="#121">121</a>                             <strong 
class="jxr_keyword">break</strong>;
+<a name="122" href="#122">122</a>                         }
+<a name="123" href="#123">123</a>                     }
+<a name="124" href="#124">124</a>                 }
+<a name="125" href="#125">125</a>                 <strong 
class="jxr_keyword">if</strong> (secretKey == <strong 
class="jxr_keyword">null</strong>) {
+<a name="126" href="#126">126</a>                     <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="127" href="#127">127</a>                         
WSSecurityException.FAILED_CHECK, <span 
class="jxr_string">"unsupportedKeyId"</span>, <strong 
class="jxr_keyword">new</strong> Object[] {uri}
+<a name="128" href="#128">128</a>                     );
+<a name="129" href="#129">129</a>                 }
+<a name="130" href="#130">130</a>             } <strong 
class="jxr_keyword">else</strong> {
+<a name="131" href="#131">131</a>                 <strong 
class="jxr_keyword">if</strong> (bspCompliant 
+<a name="132" href="#132">132</a>                     &amp;&amp; 
keyIdentifierValueType.equals(SecurityTokenReference.ENC_KEY_SHA1_URI)) {
+<a name="133" href="#133">133</a>                     
BSPEnforcer.checkEncryptedKeyBSPCompliance(secRef);
+<a name="134" href="#134">134</a>                 }
+<a name="135" href="#135">135</a>                 X509Certificate[] certs = 
secRef.getKeyIdentifier(crypto);
+<a name="136" href="#136">136</a>                 <strong 
class="jxr_keyword">if</strong> (certs == <strong 
class="jxr_keyword">null</strong> || certs.length &lt; 1 || certs[0] == <strong 
class="jxr_keyword">null</strong>) {
+<a name="137" href="#137">137</a>                     secretKey = 
+<a name="138" href="#138">138</a>                         <strong 
class="jxr_keyword">this</strong>.getSecretKeyFromToken(
+<a name="139" href="#139">139</a>                             
secRef.getKeyIdentifierValue(), keyIdentifierValueType, 
+<a name="140" href="#140">140</a>                             
WSPasswordCallback.SECRET_KEY, data
+<a name="141" href="#141">141</a>                        ); 
+<a name="142" href="#142">142</a>                     <strong 
class="jxr_keyword">if</strong> (secretKey == <strong 
class="jxr_keyword">null</strong>) {
+<a name="143" href="#143">143</a>                         <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="144" href="#144">144</a>                             
WSSecurityException.FAILED_CHECK, <span 
class="jxr_string">"unsupportedKeyId"</span>, <strong 
class="jxr_keyword">new</strong> Object[] {uri}
+<a name="145" href="#145">145</a>                         );
+<a name="146" href="#146">146</a>                     }
+<a name="147" href="#147">147</a>                 } <strong 
class="jxr_keyword">else</strong> {
+<a name="148" href="#148">148</a>                     secretKey = 
crypto.getPrivateKey(certs[0], data.getCallbackHandler()).getEncoded();
+<a name="149" href="#149">149</a>                 }
+<a name="150" href="#150">150</a>             }
+<a name="151" href="#151">151</a>         } <strong 
class="jxr_keyword">else</strong> {
+<a name="152" href="#152">152</a>             <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="153" href="#153">153</a>                 
WSSecurityException.FAILED_CHECK, <span 
class="jxr_string">"unsupportedKeyId"</span>
+<a name="154" href="#154">154</a>             );
+<a name="155" href="#155">155</a>         }
+<a name="156" href="#156">156</a>     }
+<a name="157" href="#157">157</a>     
+<a name="158" href="#158">158</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="159" href="#159">159</a> <em class="jxr_javadoccomment">     * Get 
the X509Certificates associated with this SecurityTokenReference</em>
+<a name="160" href="#160">160</a> <em class="jxr_javadoccomment">     * 
@return the X509Certificates associated with this SecurityTokenReference</em>
+<a name="161" href="#161">161</a> <em class="jxr_javadoccomment">     */</em>
+<a name="162" href="#162">162</a>     <strong 
class="jxr_keyword">public</strong> X509Certificate[] getCertificates() {
+<a name="163" href="#163">163</a>         <strong 
class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="164" href="#164">164</a>     }
+<a name="165" href="#165">165</a>     
+<a name="166" href="#166">166</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="167" href="#167">167</a> <em class="jxr_javadoccomment">     * Get 
the Principal associated with this SecurityTokenReference</em>
+<a name="168" href="#168">168</a> <em class="jxr_javadoccomment">     * 
@return the Principal associated with this SecurityTokenReference</em>
+<a name="169" href="#169">169</a> <em class="jxr_javadoccomment">     */</em>
+<a name="170" href="#170">170</a>     <strong 
class="jxr_keyword">public</strong> Principal getPrincipal() {
+<a name="171" href="#171">171</a>         <strong 
class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="172" href="#172">172</a>     }
+<a name="173" href="#173">173</a>     
+<a name="174" href="#174">174</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="175" href="#175">175</a> <em class="jxr_javadoccomment">     * Get 
the PublicKey associated with this SecurityTokenReference</em>
+<a name="176" href="#176">176</a> <em class="jxr_javadoccomment">     * 
@return the PublicKey associated with this SecurityTokenReference</em>
+<a name="177" href="#177">177</a> <em class="jxr_javadoccomment">     */</em>
+<a name="178" href="#178">178</a>     <strong 
class="jxr_keyword">public</strong> PublicKey getPublicKey() {
+<a name="179" href="#179">179</a>         <strong 
class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="180" href="#180">180</a>     }
+<a name="181" href="#181">181</a>     
+<a name="182" href="#182">182</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="183" href="#183">183</a> <em class="jxr_javadoccomment">     * Get 
the Secret Key associated with this SecurityTokenReference</em>
+<a name="184" href="#184">184</a> <em class="jxr_javadoccomment">     * 
@return the Secret Key associated with this SecurityTokenReference</em>
+<a name="185" href="#185">185</a> <em class="jxr_javadoccomment">     */</em>
+<a name="186" href="#186">186</a>     <strong 
class="jxr_keyword">public</strong> byte[] getSecretKey() {
+<a name="187" href="#187">187</a>         <strong 
class="jxr_keyword">return</strong> secretKey;
+<a name="188" href="#188">188</a>     }
+<a name="189" href="#189">189</a>     
+<a name="190" href="#190">190</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="191" href="#191">191</a> <em class="jxr_javadoccomment">     * Get 
whether the returned credential is already trusted or not. This is 
currently</em>
+<a name="192" href="#192">192</a> <em class="jxr_javadoccomment">     * 
applicable in the case of a credential extracted from a trusted HOK SAML 
Assertion,</em>
+<a name="193" href="#193">193</a> <em class="jxr_javadoccomment">     * and a 
BinarySecurityToken that has been processed by a Validator. In these cases,</em>
+<a name="194" href="#194">194</a> <em class="jxr_javadoccomment">     * the 
SignatureProcessor does not need to verify trust on the credential.</em>
+<a name="195" href="#195">195</a> <em class="jxr_javadoccomment">     * 
@return true if trust has already been verified on the returned Credential</em>
 <a name="196" href="#196">196</a> <em class="jxr_javadoccomment">     */</em>
-<a name="197" href="#197">197</a>     <strong 
class="jxr_keyword">private</strong> <strong class="jxr_keyword">void</strong> 
processPreviousResult(
-<a name="198" href="#198">198</a>         <a 
href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a>
 result,
-<a name="199" href="#199">199</a>         <a 
href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>
 secRef,
-<a name="200" href="#200">200</a>         <a 
href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a>
 data,
-<a name="201" href="#201">201</a>         <a 
href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> 
wsDocInfo,
-<a name="202" href="#202">202</a>         <strong 
class="jxr_keyword">boolean</strong> bspCompliant
-<a name="203" href="#203">203</a>     ) <strong 
class="jxr_keyword">throws</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>
 {
-<a name="204" href="#204">204</a>         <strong 
class="jxr_keyword">int</strong> action = 
((Integer)result.get(WSSecurityEngineResult.TAG_ACTION)).intValue();
-<a name="205" href="#205">205</a>         <strong 
class="jxr_keyword">if</strong> (WSConstants.UT_NOPASSWORD == action || 
WSConstants.UT == action) {
-<a name="206" href="#206">206</a>             <strong 
class="jxr_keyword">if</strong> (bspCompliant) {
-<a name="207" href="#207">207</a>                 
BSPEnforcer.checkUsernameTokenBSPCompliance(secRef);
-<a name="208" href="#208">208</a>             }
-<a name="209" href="#209">209</a>             <a 
href="../../../../../org/apache/ws/security/message/token/UsernameToken.html">UsernameToken</a>
 usernameToken = 
-<a name="210" href="#210">210</a>                 (<a 
href="../../../../../org/apache/ws/security/message/token/UsernameToken.html">UsernameToken</a>)result.get(WSSecurityEngineResult.TAG_USERNAME_TOKEN);
-<a name="211" href="#211">211</a>             
usernameToken.setRawPassword(data);
-<a name="212" href="#212">212</a>             secretKey = 
usernameToken.getDerivedKey();
-<a name="213" href="#213">213</a>         } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(WSConstants.ENCR == action) {
-<a name="214" href="#214">214</a>             <strong 
class="jxr_keyword">if</strong> (bspCompliant) {
-<a name="215" href="#215">215</a>                 
BSPEnforcer.checkEncryptedKeyBSPCompliance(secRef);
-<a name="216" href="#216">216</a>             }
-<a name="217" href="#217">217</a>             secretKey = 
(byte[])result.get(WSSecurityEngineResult.TAG_SECRET);
-<a name="218" href="#218">218</a>         } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(WSConstants.SCT == action) {
-<a name="219" href="#219">219</a>             secretKey = 
(byte[])result.get(WSSecurityEngineResult.TAG_SECRET);
-<a name="220" href="#220">220</a>         } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) {
-<a name="221" href="#221">221</a>             <a 
href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>
 assertion = 
-<a name="222" href="#222">222</a>                 (<a 
href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
-<a name="223" href="#223">223</a>             <strong 
class="jxr_keyword">if</strong> (bspCompliant) {
-<a name="224" href="#224">224</a>                 
BSPEnforcer.checkSamlTokenBSPCompliance(secRef, assertion);
+<a name="197" href="#197">197</a>     <strong 
class="jxr_keyword">public</strong> <strong 
class="jxr_keyword">boolean</strong> isTrustedCredential() {
+<a name="198" href="#198">198</a>         <strong 
class="jxr_keyword">return</strong> false;
+<a name="199" href="#199">199</a>     }
+<a name="200" href="#200">200</a> 
+<a name="201" href="#201">201</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="202" href="#202">202</a> <em class="jxr_javadoccomment">     * Get 
the Secret Key from a CallbackHandler</em>
+<a name="203" href="#203">203</a> <em class="jxr_javadoccomment">     * @param 
id The id of the element</em>
+<a name="204" href="#204">204</a> <em class="jxr_javadoccomment">     * @param 
type The type of the element (may be null)</em>
+<a name="205" href="#205">205</a> <em class="jxr_javadoccomment">     * @param 
cb The CallbackHandler object</em>
+<a name="206" href="#206">206</a> <em class="jxr_javadoccomment">     * 
@return A Secret Key</em>
+<a name="207" href="#207">207</a> <em class="jxr_javadoccomment">     * 
@throws WSSecurityException</em>
+<a name="208" href="#208">208</a> <em class="jxr_javadoccomment">     */</em>
+<a name="209" href="#209">209</a>     <strong 
class="jxr_keyword">private</strong> byte[] getSecretKeyFromToken(
+<a name="210" href="#210">210</a>         String id,
+<a name="211" href="#211">211</a>         String type,
+<a name="212" href="#212">212</a>         <strong 
class="jxr_keyword">int</strong> identifier,
+<a name="213" href="#213">213</a>         <a 
href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a>
 data
+<a name="214" href="#214">214</a>     ) <strong 
class="jxr_keyword">throws</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>
 {
+<a name="215" href="#215">215</a>         <strong 
class="jxr_keyword">if</strong> (id.charAt(0) == '#') {
+<a name="216" href="#216">216</a>             id = id.substring(1);
+<a name="217" href="#217">217</a>         }
+<a name="218" href="#218">218</a>         <a 
href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>
 pwcb = 
+<a name="219" href="#219">219</a>             <strong 
class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>(id,
 <strong class="jxr_keyword">null</strong>, type, identifier, data);
+<a name="220" href="#220">220</a>         <strong 
class="jxr_keyword">try</strong> {
+<a name="221" href="#221">221</a>             Callback[] callbacks = <strong 
class="jxr_keyword">new</strong> Callback[]{pwcb};
+<a name="222" href="#222">222</a>             <strong 
class="jxr_keyword">if</strong> (data.getCallbackHandler() != <strong 
class="jxr_keyword">null</strong>) {
+<a name="223" href="#223">223</a>                 
data.getCallbackHandler().handle(callbacks);
+<a name="224" href="#224">224</a>                 <strong 
class="jxr_keyword">return</strong> pwcb.getKey();
 <a name="225" href="#225">225</a>             }
-<a name="226" href="#226">226</a>             <a 
href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>
 keyInfo = 
-<a name="227" href="#227">227</a>                 
SAMLUtil.getCredentialFromSubject(assertion, 
-<a name="228" href="#228">228</a>                                              
     data, wsDocInfo, bspCompliant);
-<a name="229" href="#229">229</a>             <em class="jxr_comment">// TODO 
Handle malformed SAML tokens where they don't have the </em>
-<a name="230" href="#230">230</a>             <em class="jxr_comment">// 
secret in them</em>
-<a name="231" href="#231">231</a>             secretKey = keyInfo.getSecret();
-<a name="232" href="#232">232</a>         } <strong 
class="jxr_keyword">else</strong> {
-<a name="233" href="#233">233</a>             <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="234" href="#234">234</a>                 
WSSecurityException.FAILED_CHECK, <span 
class="jxr_string">"unsupportedKeyId"</span>
-<a name="235" href="#235">235</a>             );
-<a name="236" href="#236">236</a>         }
-<a name="237" href="#237">237</a>     }
-<a name="238" href="#238">238</a> }
+<a name="226" href="#226">226</a>         } <strong 
class="jxr_keyword">catch</strong> (Exception e) {
+<a name="227" href="#227">227</a>             <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="228" href="#228">228</a>                 WSSecurityException.FAILURE,
+<a name="229" href="#229">229</a>                 <span 
class="jxr_string">"noPassword"</span>, 
+<a name="230" href="#230">230</a>                 <strong 
class="jxr_keyword">new</strong> Object[] {id}, 
+<a name="231" href="#231">231</a>                 e
+<a name="232" href="#232">232</a>             );
+<a name="233" href="#233">233</a>         }
+<a name="234" href="#234">234</a> 
+<a name="235" href="#235">235</a>         <strong 
class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="236" href="#236">236</a>     }
+<a name="237" href="#237">237</a>     
+<a name="238" href="#238">238</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="239" href="#239">239</a> <em class="jxr_javadoccomment">     * 
Process a previous security result</em>
+<a name="240" href="#240">240</a> <em class="jxr_javadoccomment">     */</em>
+<a name="241" href="#241">241</a>     <strong 
class="jxr_keyword">private</strong> <strong class="jxr_keyword">void</strong> 
processPreviousResult(
+<a name="242" href="#242">242</a>         <a 
href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a>
 result,
+<a name="243" href="#243">243</a>         <a 
href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>
 secRef,
+<a name="244" href="#244">244</a>         <a 
href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a>
 data,
+<a name="245" href="#245">245</a>         <a 
href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> 
wsDocInfo,
+<a name="246" href="#246">246</a>         <strong 
class="jxr_keyword">boolean</strong> bspCompliant
+<a name="247" href="#247">247</a>     ) <strong 
class="jxr_keyword">throws</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>
 {
+<a name="248" href="#248">248</a>         <strong 
class="jxr_keyword">int</strong> action = 
((Integer)result.get(WSSecurityEngineResult.TAG_ACTION)).intValue();
+<a name="249" href="#249">249</a>         <strong 
class="jxr_keyword">if</strong> (WSConstants.UT_NOPASSWORD == action || 
WSConstants.UT == action) {
+<a name="250" href="#250">250</a>             <strong 
class="jxr_keyword">if</strong> (bspCompliant) {
+<a name="251" href="#251">251</a>                 
BSPEnforcer.checkUsernameTokenBSPCompliance(secRef);
+<a name="252" href="#252">252</a>             }
+<a name="253" href="#253">253</a>             <a 
href="../../../../../org/apache/ws/security/message/token/UsernameToken.html">UsernameToken</a>
 usernameToken = 
+<a name="254" href="#254">254</a>                 (<a 
href="../../../../../org/apache/ws/security/message/token/UsernameToken.html">UsernameToken</a>)result.get(WSSecurityEngineResult.TAG_USERNAME_TOKEN);
+<a name="255" href="#255">255</a>             
usernameToken.setRawPassword(data);
+<a name="256" href="#256">256</a>             secretKey = 
usernameToken.getDerivedKey();
+<a name="257" href="#257">257</a>         } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(WSConstants.ENCR == action) {
+<a name="258" href="#258">258</a>             <strong 
class="jxr_keyword">if</strong> (bspCompliant) {
+<a name="259" href="#259">259</a>                 
BSPEnforcer.checkEncryptedKeyBSPCompliance(secRef);
+<a name="260" href="#260">260</a>             }
+<a name="261" href="#261">261</a>             secretKey = 
(byte[])result.get(WSSecurityEngineResult.TAG_SECRET);
+<a name="262" href="#262">262</a>         } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(WSConstants.SCT == action || WSConstants.BST == action) {
+<a name="263" href="#263">263</a>             secretKey = 
(byte[])result.get(WSSecurityEngineResult.TAG_SECRET);
+<a name="264" href="#264">264</a>         } <strong 
class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> 
(WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) {
+<a name="265" href="#265">265</a>             <a 
href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>
 assertion = 
+<a name="266" href="#266">266</a>                 (<a 
href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
+<a name="267" href="#267">267</a>             <strong 
class="jxr_keyword">if</strong> (bspCompliant) {
+<a name="268" href="#268">268</a>                 
BSPEnforcer.checkSamlTokenBSPCompliance(secRef, assertion);
+<a name="269" href="#269">269</a>             }
+<a name="270" href="#270">270</a>             <a 
href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>
 keyInfo = 
+<a name="271" href="#271">271</a>                 
SAMLUtil.getCredentialFromSubject(assertion, 
+<a name="272" href="#272">272</a>                                              
     data, wsDocInfo, bspCompliant);
+<a name="273" href="#273">273</a>             <em class="jxr_comment">// TODO 
Handle malformed SAML tokens where they don't have the </em>
+<a name="274" href="#274">274</a>             <em class="jxr_comment">// 
secret in them</em>
+<a name="275" href="#275">275</a>             secretKey = keyInfo.getSecret();
+<a name="276" href="#276">276</a>         } <strong 
class="jxr_keyword">else</strong> {
+<a name="277" href="#277">277</a>             <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="278" href="#278">278</a>                 
WSSecurityException.FAILED_CHECK, <span 
class="jxr_string">"unsupportedKeyId"</span>
+<a name="279" href="#279">279</a>             );
+<a name="280" href="#280">280</a>         }
+<a name="281" href="#281">281</a>     }
+<a name="282" href="#282">282</a> }
 </pre>
 <hr/><div id="footer">This page was automatically generated by <a 
href="http://maven.apache.org/";>Maven</a></div></body>
 </html>


Reply via email to