Modified: webservices/wss4j/site/xref/org/apache/ws/security/str/SecurityTokenRefSTRParser.html URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/str/SecurityTokenRefSTRParser.html?rev=1178426&r1=1178425&r2=1178426&view=diff ============================================================================== --- webservices/wss4j/site/xref/org/apache/ws/security/str/SecurityTokenRefSTRParser.html (original) +++ webservices/wss4j/site/xref/org/apache/ws/security/str/SecurityTokenRefSTRParser.html Mon Oct 3 15:15:52 2011 @@ -33,243 +33,295 @@ <a name="23" href="#23">23</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSDocInfo; <a name="24" href="#24">24</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSPasswordCallback; <a name="25" href="#25">25</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSConfig; -<a name="26" href="#26">26</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityEngineResult; -<a name="27" href="#27">27</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityException; -<a name="28" href="#28">28</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.handler.RequestData; -<a name="29" href="#29">29</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.DerivedKeyToken; -<a name="30" href="#30">30</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.Reference; -<a name="31" href="#31">31</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.SecurityTokenReference; -<a name="32" href="#32">32</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.SAMLKeyInfo; -<a name="33" href="#33">33</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.SAMLUtil; -<a name="34" href="#34">34</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.ext.AssertionWrapper; -<a name="35" href="#35">35</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.WSSecurityUtil; -<a name="36" href="#36">36</a> <strong class="jxr_keyword">import</strong> org.w3c.dom.Element; -<a name="37" href="#37">37</a> -<a name="38" href="#38">38</a> <strong class="jxr_keyword">import</strong> java.security.Principal; -<a name="39" href="#39">39</a> <strong class="jxr_keyword">import</strong> java.security.PublicKey; -<a name="40" href="#40">40</a> <strong class="jxr_keyword">import</strong> java.security.cert.X509Certificate; -<a name="41" href="#41">41</a> <strong class="jxr_keyword">import</strong> java.util.Map; -<a name="42" href="#42">42</a> -<a name="43" href="#43">43</a> <strong class="jxr_keyword">import</strong> javax.security.auth.callback.Callback; -<a name="44" href="#44">44</a> -<a name="45" href="#45">45</a> <em class="jxr_javadoccomment">/**</em> -<a name="46" href="#46">46</a> <em class="jxr_javadoccomment"> * This implementation of STRParser is for parsing a SecurityTokenReference element, found in the</em> -<a name="47" href="#47">47</a> <em class="jxr_javadoccomment"> * KeyInfo element associated with an EncryptedData element.</em> -<a name="48" href="#48">48</a> <em class="jxr_javadoccomment"> */</em> -<a name="49" href="#49">49</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/str/SecurityTokenRefSTRParser.html">SecurityTokenRefSTRParser</a> implements <a href="../../../../../org/apache/ws/security/str/STRParser.html">STRParser</a> { -<a name="50" href="#50">50</a> -<a name="51" href="#51">51</a> <em class="jxr_javadoccomment">/**</em> -<a name="52" href="#52">52</a> <em class="jxr_javadoccomment"> * The Signature method. This is used when deriving a key.</em> -<a name="53" href="#53">53</a> <em class="jxr_javadoccomment"> */</em> -<a name="54" href="#54">54</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> String SIGNATURE_METHOD = <span class="jxr_string">"signature_method"</span>; -<a name="55" href="#55">55</a> -<a name="56" href="#56">56</a> <strong class="jxr_keyword">private</strong> byte[] secretKey; -<a name="57" href="#57">57</a> -<a name="58" href="#58">58</a> <em class="jxr_javadoccomment">/**</em> -<a name="59" href="#59">59</a> <em class="jxr_javadoccomment"> * Parse a SecurityTokenReference element and extract credentials.</em> -<a name="60" href="#60">60</a> <em class="jxr_javadoccomment"> * </em> -<a name="61" href="#61">61</a> <em class="jxr_javadoccomment"> * @param strElement The SecurityTokenReference element</em> -<a name="62" href="#62">62</a> <em class="jxr_javadoccomment"> * @param data the RequestData associated with the request</em> -<a name="63" href="#63">63</a> <em class="jxr_javadoccomment"> * @param wsDocInfo The WSDocInfo object to access previous processing results</em> -<a name="64" href="#64">64</a> <em class="jxr_javadoccomment"> * @param parameters A set of implementation-specific parameters</em> -<a name="65" href="#65">65</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em> -<a name="66" href="#66">66</a> <em class="jxr_javadoccomment"> */</em> -<a name="67" href="#67">67</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> parseSecurityTokenReference( -<a name="68" href="#68">68</a> Element strElement, -<a name="69" href="#69">69</a> <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data, -<a name="70" href="#70">70</a> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo, -<a name="71" href="#71">71</a> Map<String, Object> parameters -<a name="72" href="#72">72</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> { -<a name="73" href="#73">73</a> <strong class="jxr_keyword">boolean</strong> bspCompliant = <strong class="jxr_keyword">true</strong>; -<a name="74" href="#74">74</a> <a href="../../../../../org/apache/ws/security/WSSConfig.html">WSSConfig</a> config = data.getWssConfig(); -<a name="75" href="#75">75</a> <strong class="jxr_keyword">if</strong> (config != <strong class="jxr_keyword">null</strong>) { -<a name="76" href="#76">76</a> bspCompliant = config.isWsiBSPCompliant(); -<a name="77" href="#77">77</a> } -<a name="78" href="#78">78</a> -<a name="79" href="#79">79</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(strElement, bspCompliant); -<a name="80" href="#80">80</a> -<a name="81" href="#81">81</a> String uri = <strong class="jxr_keyword">null</strong>; -<a name="82" href="#82">82</a> <strong class="jxr_keyword">if</strong> (secRef.containsReference()) { -<a name="83" href="#83">83</a> uri = secRef.getReference().getURI(); -<a name="84" href="#84">84</a> <strong class="jxr_keyword">if</strong> (uri.charAt(0) == '#') { -<a name="85" href="#85">85</a> uri = uri.substring(1); -<a name="86" href="#86">86</a> } -<a name="87" href="#87">87</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) { -<a name="88" href="#88">88</a> uri = secRef.getKeyIdentifierValue(); -<a name="89" href="#89">89</a> } -<a name="90" href="#90">90</a> -<a name="91" href="#91">91</a> <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a> result = wsDocInfo.getResult(uri); -<a name="92" href="#92">92</a> <strong class="jxr_keyword">if</strong> (result != <strong class="jxr_keyword">null</strong>) { -<a name="93" href="#93">93</a> processPreviousResult(result, secRef, data, parameters, wsDocInfo, bspCompliant); -<a name="94" href="#94">94</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsReference()) { -<a name="95" href="#95">95</a> <a href="../../../../../org/apache/ws/security/message/token/Reference.html">Reference</a> reference = secRef.getReference(); -<a name="96" href="#96">96</a> <em class="jxr_comment">// Try asking the CallbackHandler for the secret key</em> -<a name="97" href="#97">97</a> secretKey = getSecretKeyFromToken(uri, reference.getValueType(), data); -<a name="98" href="#98">98</a> <strong class="jxr_keyword">if</strong> (secretKey == <strong class="jxr_keyword">null</strong>) { -<a name="99" href="#99">99</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>( -<a name="100" href="#100">100</a> WSSecurityException.FAILED_CHECK, <span class="jxr_string">"unsupportedKeyId"</span>, <strong class="jxr_keyword">new</strong> Object[] {uri} -<a name="101" href="#101">101</a> ); -<a name="102" href="#102">102</a> } -<a name="103" href="#103">103</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) { -<a name="104" href="#104">104</a> String valueType = secRef.getKeyIdentifierValueType(); -<a name="105" href="#105">105</a> <strong class="jxr_keyword">if</strong> (WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(valueType) -<a name="106" href="#106">106</a> || WSConstants.WSS_SAML2_KI_VALUE_TYPE.equals(valueType)) { -<a name="107" href="#107">107</a> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion = -<a name="108" href="#108">108</a> SAMLUtil.getAssertionFromKeyIdentifier( -<a name="109" href="#109">109</a> secRef, strElement, -<a name="110" href="#110">110</a> data, wsDocInfo -<a name="111" href="#111">111</a> ); -<a name="112" href="#112">112</a> secretKey = -<a name="113" href="#113">113</a> getSecretKeyFromAssertion(assertion, secRef, data, wsDocInfo, bspCompliant); -<a name="114" href="#114">114</a> } <strong class="jxr_keyword">else</strong> { -<a name="115" href="#115">115</a> <strong class="jxr_keyword">if</strong> (bspCompliant && SecurityTokenReference.ENC_KEY_SHA1_URI.equals(valueType)) { -<a name="116" href="#116">116</a> BSPEnforcer.checkEncryptedKeyBSPCompliance(secRef); -<a name="117" href="#117">117</a> } -<a name="118" href="#118">118</a> secretKey = -<a name="119" href="#119">119</a> getSecretKeyFromToken( -<a name="120" href="#120">120</a> secRef.getKeyIdentifierValue(), secRef.getKeyIdentifierValueType(), data -<a name="121" href="#121">121</a> ); -<a name="122" href="#122">122</a> } -<a name="123" href="#123">123</a> } <strong class="jxr_keyword">else</strong> { -<a name="124" href="#124">124</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_CHECK, <span class="jxr_string">"noReference"</span>); -<a name="125" href="#125">125</a> } -<a name="126" href="#126">126</a> } -<a name="127" href="#127">127</a> -<a name="128" href="#128">128</a> <em class="jxr_javadoccomment">/**</em> -<a name="129" href="#129">129</a> <em class="jxr_javadoccomment"> * Get the X509Certificates associated with this SecurityTokenReference</em> -<a name="130" href="#130">130</a> <em class="jxr_javadoccomment"> * @return the X509Certificates associated with this SecurityTokenReference</em> -<a name="131" href="#131">131</a> <em class="jxr_javadoccomment"> */</em> -<a name="132" href="#132">132</a> <strong class="jxr_keyword">public</strong> X509Certificate[] getCertificates() { -<a name="133" href="#133">133</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>; -<a name="134" href="#134">134</a> } -<a name="135" href="#135">135</a> -<a name="136" href="#136">136</a> <em class="jxr_javadoccomment">/**</em> -<a name="137" href="#137">137</a> <em class="jxr_javadoccomment"> * Get the Principal associated with this SecurityTokenReference</em> -<a name="138" href="#138">138</a> <em class="jxr_javadoccomment"> * @return the Principal associated with this SecurityTokenReference</em> -<a name="139" href="#139">139</a> <em class="jxr_javadoccomment"> */</em> -<a name="140" href="#140">140</a> <strong class="jxr_keyword">public</strong> Principal getPrincipal() { -<a name="141" href="#141">141</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>; -<a name="142" href="#142">142</a> } -<a name="143" href="#143">143</a> -<a name="144" href="#144">144</a> <em class="jxr_javadoccomment">/**</em> -<a name="145" href="#145">145</a> <em class="jxr_javadoccomment"> * Get the PublicKey associated with this SecurityTokenReference</em> -<a name="146" href="#146">146</a> <em class="jxr_javadoccomment"> * @return the PublicKey associated with this SecurityTokenReference</em> -<a name="147" href="#147">147</a> <em class="jxr_javadoccomment"> */</em> -<a name="148" href="#148">148</a> <strong class="jxr_keyword">public</strong> PublicKey getPublicKey() { -<a name="149" href="#149">149</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>; -<a name="150" href="#150">150</a> } -<a name="151" href="#151">151</a> -<a name="152" href="#152">152</a> <em class="jxr_javadoccomment">/**</em> -<a name="153" href="#153">153</a> <em class="jxr_javadoccomment"> * Get the Secret Key associated with this SecurityTokenReference</em> -<a name="154" href="#154">154</a> <em class="jxr_javadoccomment"> * @return the Secret Key associated with this SecurityTokenReference</em> -<a name="155" href="#155">155</a> <em class="jxr_javadoccomment"> */</em> -<a name="156" href="#156">156</a> <strong class="jxr_keyword">public</strong> byte[] getSecretKey() { -<a name="157" href="#157">157</a> <strong class="jxr_keyword">return</strong> secretKey; -<a name="158" href="#158">158</a> } -<a name="159" href="#159">159</a> -<a name="160" href="#160">160</a> <em class="jxr_javadoccomment">/**</em> -<a name="161" href="#161">161</a> <em class="jxr_javadoccomment"> * Get whether the returned credential is already trusted or not. This is currently</em> -<a name="162" href="#162">162</a> <em class="jxr_javadoccomment"> * applicable in the case of a credential extracted from a trusted HOK SAML Assertion,</em> -<a name="163" href="#163">163</a> <em class="jxr_javadoccomment"> * and a BinarySecurityToken that has been processed by a Validator. In these cases,</em> -<a name="164" href="#164">164</a> <em class="jxr_javadoccomment"> * the SignatureProcessor does not need to verify trust on the credential.</em> -<a name="165" href="#165">165</a> <em class="jxr_javadoccomment"> * @return true if trust has already been verified on the returned Credential</em> -<a name="166" href="#166">166</a> <em class="jxr_javadoccomment"> */</em> -<a name="167" href="#167">167</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> isTrustedCredential() { -<a name="168" href="#168">168</a> <strong class="jxr_keyword">return</strong> false; -<a name="169" href="#169">169</a> } -<a name="170" href="#170">170</a> -<a name="171" href="#171">171</a> <em class="jxr_javadoccomment">/**</em> -<a name="172" href="#172">172</a> <em class="jxr_javadoccomment"> * Get the Secret Key from a CallbackHandler</em> -<a name="173" href="#173">173</a> <em class="jxr_javadoccomment"> * @param id The id of the element</em> -<a name="174" href="#174">174</a> <em class="jxr_javadoccomment"> * @param type The type of the element (may be null)</em> -<a name="175" href="#175">175</a> <em class="jxr_javadoccomment"> * @param cb The CallbackHandler object</em> -<a name="176" href="#176">176</a> <em class="jxr_javadoccomment"> * @return A Secret Key</em> -<a name="177" href="#177">177</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em> -<a name="178" href="#178">178</a> <em class="jxr_javadoccomment"> */</em> -<a name="179" href="#179">179</a> <strong class="jxr_keyword">private</strong> byte[] getSecretKeyFromToken( -<a name="180" href="#180">180</a> String id, -<a name="181" href="#181">181</a> String type, -<a name="182" href="#182">182</a> <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data -<a name="183" href="#183">183</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> { -<a name="184" href="#184">184</a> <strong class="jxr_keyword">if</strong> (id.charAt(0) == '#') { -<a name="185" href="#185">185</a> id = id.substring(1); -<a name="186" href="#186">186</a> } -<a name="187" href="#187">187</a> <a href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a> pwcb = -<a name="188" href="#188">188</a> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>(id, <strong class="jxr_keyword">null</strong>, type, WSPasswordCallback.SECRET_KEY, data); -<a name="189" href="#189">189</a> <strong class="jxr_keyword">try</strong> { -<a name="190" href="#190">190</a> Callback[] callbacks = <strong class="jxr_keyword">new</strong> Callback[]{pwcb}; -<a name="191" href="#191">191</a> data.getCallbackHandler().handle(callbacks); -<a name="192" href="#192">192</a> } <strong class="jxr_keyword">catch</strong> (Exception e) { -<a name="193" href="#193">193</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>( -<a name="194" href="#194">194</a> WSSecurityException.FAILURE, -<a name="195" href="#195">195</a> <span class="jxr_string">"noPassword"</span>, -<a name="196" href="#196">196</a> <strong class="jxr_keyword">new</strong> Object[] {id}, -<a name="197" href="#197">197</a> e -<a name="198" href="#198">198</a> ); -<a name="199" href="#199">199</a> } -<a name="200" href="#200">200</a> -<a name="201" href="#201">201</a> <strong class="jxr_keyword">return</strong> pwcb.getKey(); -<a name="202" href="#202">202</a> } -<a name="203" href="#203">203</a> -<a name="204" href="#204">204</a> <em class="jxr_javadoccomment">/**</em> -<a name="205" href="#205">205</a> <em class="jxr_javadoccomment"> * Get a SecretKey from a SAML Assertion</em> -<a name="206" href="#206">206</a> <em class="jxr_javadoccomment"> */</em> -<a name="207" href="#207">207</a> <strong class="jxr_keyword">private</strong> byte[] getSecretKeyFromAssertion( -<a name="208" href="#208">208</a> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion, -<a name="209" href="#209">209</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef, -<a name="210" href="#210">210</a> <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data, -<a name="211" href="#211">211</a> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo, -<a name="212" href="#212">212</a> <strong class="jxr_keyword">boolean</strong> bspCompliant -<a name="213" href="#213">213</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> { -<a name="214" href="#214">214</a> <strong class="jxr_keyword">if</strong> (bspCompliant) { -<a name="215" href="#215">215</a> BSPEnforcer.checkSamlTokenBSPCompliance(secRef, assertion); -<a name="216" href="#216">216</a> } -<a name="217" href="#217">217</a> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> samlKi = -<a name="218" href="#218">218</a> SAMLUtil.getCredentialFromSubject(assertion, data, wsDocInfo, bspCompliant); -<a name="219" href="#219">219</a> <strong class="jxr_keyword">if</strong> (samlKi == <strong class="jxr_keyword">null</strong>) { -<a name="220" href="#220">220</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>( -<a name="221" href="#221">221</a> WSSecurityException.FAILED_CHECK, <span class="jxr_string">"invalidSAMLToken"</span>, <strong class="jxr_keyword">new</strong> Object[] {<span class="jxr_string">"No Secret Key"</span>} -<a name="222" href="#222">222</a> ); -<a name="223" href="#223">223</a> } -<a name="224" href="#224">224</a> <strong class="jxr_keyword">return</strong> samlKi.getSecret(); -<a name="225" href="#225">225</a> } -<a name="226" href="#226">226</a> -<a name="227" href="#227">227</a> <em class="jxr_javadoccomment">/**</em> -<a name="228" href="#228">228</a> <em class="jxr_javadoccomment"> * Process a previous security result</em> -<a name="229" href="#229">229</a> <em class="jxr_javadoccomment"> */</em> -<a name="230" href="#230">230</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">void</strong> processPreviousResult( -<a name="231" href="#231">231</a> <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a> result, -<a name="232" href="#232">232</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef, -<a name="233" href="#233">233</a> <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data, -<a name="234" href="#234">234</a> Map<String, Object> parameters, -<a name="235" href="#235">235</a> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo, -<a name="236" href="#236">236</a> <strong class="jxr_keyword">boolean</strong> bspCompliant -<a name="237" href="#237">237</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> { -<a name="238" href="#238">238</a> <strong class="jxr_keyword">int</strong> action = ((Integer)result.get(WSSecurityEngineResult.TAG_ACTION)).intValue(); -<a name="239" href="#239">239</a> <strong class="jxr_keyword">if</strong> (WSConstants.ENCR == action) { -<a name="240" href="#240">240</a> <strong class="jxr_keyword">if</strong> (bspCompliant) { -<a name="241" href="#241">241</a> BSPEnforcer.checkEncryptedKeyBSPCompliance(secRef); -<a name="242" href="#242">242</a> } -<a name="243" href="#243">243</a> secretKey = (byte[])result.get(WSSecurityEngineResult.TAG_SECRET); -<a name="244" href="#244">244</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (WSConstants.DKT == action) { -<a name="245" href="#245">245</a> <a href="../../../../../org/apache/ws/security/message/token/DerivedKeyToken.html">DerivedKeyToken</a> dkt = -<a name="246" href="#246">246</a> (<a href="../../../../../org/apache/ws/security/message/token/DerivedKeyToken.html">DerivedKeyToken</a>)result.get(WSSecurityEngineResult.TAG_DERIVED_KEY_TOKEN); -<a name="247" href="#247">247</a> byte[] secret = -<a name="248" href="#248">248</a> (byte[])result.get(WSSecurityEngineResult.TAG_SECRET); -<a name="249" href="#249">249</a> String algorithm = (String)parameters.get(SIGNATURE_METHOD); -<a name="250" href="#250">250</a> secretKey = dkt.deriveKey(WSSecurityUtil.getKeyLength(algorithm), secret); -<a name="251" href="#251">251</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) { -<a name="252" href="#252">252</a> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion = -<a name="253" href="#253">253</a> (<a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION); -<a name="254" href="#254">254</a> secretKey = -<a name="255" href="#255">255</a> getSecretKeyFromAssertion(assertion, secRef, data, wsDocInfo, bspCompliant); -<a name="256" href="#256">256</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (WSConstants.SCT == action) { -<a name="257" href="#257">257</a> secretKey = (byte[])result.get(WSSecurityEngineResult.TAG_SECRET); -<a name="258" href="#258">258</a> } -<a name="259" href="#259">259</a> } -<a name="260" href="#260">260</a> -<a name="261" href="#261">261</a> -<a name="262" href="#262">262</a> } +<a name="26" href="#26">26</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityEngine; +<a name="27" href="#27">27</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityEngineResult; +<a name="28" href="#28">28</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityException; +<a name="29" href="#29">29</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.handler.RequestData; +<a name="30" href="#30">30</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.BinarySecurity; +<a name="31" href="#31">31</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.DerivedKeyToken; +<a name="32" href="#32">32</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.Reference; +<a name="33" href="#33">33</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.SecurityTokenReference; +<a name="34" href="#34">34</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.processor.Processor; +<a name="35" href="#35">35</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.SAMLKeyInfo; +<a name="36" href="#36">36</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.SAMLUtil; +<a name="37" href="#37">37</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.ext.AssertionWrapper; +<a name="38" href="#38">38</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.WSSecurityUtil; +<a name="39" href="#39">39</a> <strong class="jxr_keyword">import</strong> org.w3c.dom.Element; +<a name="40" href="#40">40</a> +<a name="41" href="#41">41</a> <strong class="jxr_keyword">import</strong> java.security.Principal; +<a name="42" href="#42">42</a> <strong class="jxr_keyword">import</strong> java.security.PublicKey; +<a name="43" href="#43">43</a> <strong class="jxr_keyword">import</strong> java.security.cert.X509Certificate; +<a name="44" href="#44">44</a> <strong class="jxr_keyword">import</strong> java.util.Arrays; +<a name="45" href="#45">45</a> <strong class="jxr_keyword">import</strong> java.util.List; +<a name="46" href="#46">46</a> <strong class="jxr_keyword">import</strong> java.util.Map; +<a name="47" href="#47">47</a> +<a name="48" href="#48">48</a> <strong class="jxr_keyword">import</strong> javax.security.auth.callback.Callback; +<a name="49" href="#49">49</a> <strong class="jxr_keyword">import</strong> javax.xml.namespace.QName; +<a name="50" href="#50">50</a> +<a name="51" href="#51">51</a> <em class="jxr_javadoccomment">/**</em> +<a name="52" href="#52">52</a> <em class="jxr_javadoccomment"> * This implementation of STRParser is for parsing a SecurityTokenReference element, found in the</em> +<a name="53" href="#53">53</a> <em class="jxr_javadoccomment"> * KeyInfo element associated with an EncryptedData element.</em> +<a name="54" href="#54">54</a> <em class="jxr_javadoccomment"> */</em> +<a name="55" href="#55">55</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/str/SecurityTokenRefSTRParser.html">SecurityTokenRefSTRParser</a> implements <a href="../../../../../org/apache/ws/security/str/STRParser.html">STRParser</a> { +<a name="56" href="#56">56</a> +<a name="57" href="#57">57</a> <em class="jxr_javadoccomment">/**</em> +<a name="58" href="#58">58</a> <em class="jxr_javadoccomment"> * The Signature method. This is used when deriving a key.</em> +<a name="59" href="#59">59</a> <em class="jxr_javadoccomment"> */</em> +<a name="60" href="#60">60</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> String SIGNATURE_METHOD = <span class="jxr_string">"signature_method"</span>; +<a name="61" href="#61">61</a> +<a name="62" href="#62">62</a> <strong class="jxr_keyword">private</strong> byte[] secretKey; +<a name="63" href="#63">63</a> +<a name="64" href="#64">64</a> <em class="jxr_javadoccomment">/**</em> +<a name="65" href="#65">65</a> <em class="jxr_javadoccomment"> * Parse a SecurityTokenReference element and extract credentials.</em> +<a name="66" href="#66">66</a> <em class="jxr_javadoccomment"> * </em> +<a name="67" href="#67">67</a> <em class="jxr_javadoccomment"> * @param strElement The SecurityTokenReference element</em> +<a name="68" href="#68">68</a> <em class="jxr_javadoccomment"> * @param data the RequestData associated with the request</em> +<a name="69" href="#69">69</a> <em class="jxr_javadoccomment"> * @param wsDocInfo The WSDocInfo object to access previous processing results</em> +<a name="70" href="#70">70</a> <em class="jxr_javadoccomment"> * @param parameters A set of implementation-specific parameters</em> +<a name="71" href="#71">71</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em> +<a name="72" href="#72">72</a> <em class="jxr_javadoccomment"> */</em> +<a name="73" href="#73">73</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> parseSecurityTokenReference( +<a name="74" href="#74">74</a> Element strElement, +<a name="75" href="#75">75</a> <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data, +<a name="76" href="#76">76</a> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo, +<a name="77" href="#77">77</a> Map<String, Object> parameters +<a name="78" href="#78">78</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> { +<a name="79" href="#79">79</a> <strong class="jxr_keyword">boolean</strong> bspCompliant = <strong class="jxr_keyword">true</strong>; +<a name="80" href="#80">80</a> <a href="../../../../../org/apache/ws/security/WSSConfig.html">WSSConfig</a> config = data.getWssConfig(); +<a name="81" href="#81">81</a> <strong class="jxr_keyword">if</strong> (config != <strong class="jxr_keyword">null</strong>) { +<a name="82" href="#82">82</a> bspCompliant = config.isWsiBSPCompliant(); +<a name="83" href="#83">83</a> } +<a name="84" href="#84">84</a> +<a name="85" href="#85">85</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(strElement, bspCompliant); +<a name="86" href="#86">86</a> +<a name="87" href="#87">87</a> String uri = <strong class="jxr_keyword">null</strong>; +<a name="88" href="#88">88</a> <strong class="jxr_keyword">if</strong> (secRef.containsReference()) { +<a name="89" href="#89">89</a> uri = secRef.getReference().getURI(); +<a name="90" href="#90">90</a> <strong class="jxr_keyword">if</strong> (uri.charAt(0) == '#') { +<a name="91" href="#91">91</a> uri = uri.substring(1); +<a name="92" href="#92">92</a> } +<a name="93" href="#93">93</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) { +<a name="94" href="#94">94</a> uri = secRef.getKeyIdentifierValue(); +<a name="95" href="#95">95</a> } +<a name="96" href="#96">96</a> +<a name="97" href="#97">97</a> <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a> result = wsDocInfo.getResult(uri); +<a name="98" href="#98">98</a> <strong class="jxr_keyword">if</strong> (result != <strong class="jxr_keyword">null</strong>) { +<a name="99" href="#99">99</a> processPreviousResult(result, secRef, data, parameters, wsDocInfo, bspCompliant); +<a name="100" href="#100">100</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsReference()) { +<a name="101" href="#101">101</a> <a href="../../../../../org/apache/ws/security/message/token/Reference.html">Reference</a> reference = secRef.getReference(); +<a name="102" href="#102">102</a> <em class="jxr_comment">// Try asking the CallbackHandler for the secret key</em> +<a name="103" href="#103">103</a> secretKey = getSecretKeyFromToken(uri, reference.getValueType(), data); +<a name="104" href="#104">104</a> <strong class="jxr_keyword">if</strong> (secretKey == <strong class="jxr_keyword">null</strong>) { +<a name="105" href="#105">105</a> Element token = +<a name="106" href="#106">106</a> secRef.getTokenElement(strElement.getOwnerDocument(), wsDocInfo, data.getCallbackHandler()); +<a name="107" href="#107">107</a> QName el = <strong class="jxr_keyword">new</strong> QName(token.getNamespaceURI(), token.getLocalName()); +<a name="108" href="#108">108</a> <strong class="jxr_keyword">if</strong> (el.equals(WSSecurityEngine.BINARY_TOKEN)) { +<a name="109" href="#109">109</a> <a href="../../../../../org/apache/ws/security/processor/Processor.html">Processor</a> proc = data.getWssConfig().getProcessor(WSSecurityEngine.BINARY_TOKEN); +<a name="110" href="#110">110</a> List<WSSecurityEngineResult> bstResult = +<a name="111" href="#111">111</a> proc.handleToken(token, data, wsDocInfo); +<a name="112" href="#112">112</a> <a href="../../../../../org/apache/ws/security/message/token/BinarySecurity.html">BinarySecurity</a> bstToken = +<a name="113" href="#113">113</a> (<a href="../../../../../org/apache/ws/security/message/token/BinarySecurity.html">BinarySecurity</a>)bstResult.get(0).get(WSSecurityEngineResult.TAG_BINARY_SECURITY_TOKEN); +<a name="114" href="#114">114</a> <strong class="jxr_keyword">if</strong> (bspCompliant) { +<a name="115" href="#115">115</a> BSPEnforcer.checkBinarySecurityBSPCompliance(secRef, bstToken); +<a name="116" href="#116">116</a> } +<a name="117" href="#117">117</a> secretKey = (byte[])bstResult.get(0).get(WSSecurityEngineResult.TAG_SECRET); +<a name="118" href="#118">118</a> } +<a name="119" href="#119">119</a> } +<a name="120" href="#120">120</a> <strong class="jxr_keyword">if</strong> (secretKey == <strong class="jxr_keyword">null</strong>) { +<a name="121" href="#121">121</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>( +<a name="122" href="#122">122</a> WSSecurityException.FAILED_CHECK, <span class="jxr_string">"unsupportedKeyId"</span>, <strong class="jxr_keyword">new</strong> Object[] {uri} +<a name="123" href="#123">123</a> ); +<a name="124" href="#124">124</a> } +<a name="125" href="#125">125</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) { +<a name="126" href="#126">126</a> String valueType = secRef.getKeyIdentifierValueType(); +<a name="127" href="#127">127</a> <strong class="jxr_keyword">if</strong> (WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(valueType) +<a name="128" href="#128">128</a> || WSConstants.WSS_SAML2_KI_VALUE_TYPE.equals(valueType)) { +<a name="129" href="#129">129</a> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion = +<a name="130" href="#130">130</a> SAMLUtil.getAssertionFromKeyIdentifier( +<a name="131" href="#131">131</a> secRef, strElement, +<a name="132" href="#132">132</a> data, wsDocInfo +<a name="133" href="#133">133</a> ); +<a name="134" href="#134">134</a> secretKey = +<a name="135" href="#135">135</a> getSecretKeyFromAssertion(assertion, secRef, data, wsDocInfo, bspCompliant); +<a name="136" href="#136">136</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (WSConstants.WSS_KRB_KI_VALUE_TYPE.equals(valueType)) { +<a name="137" href="#137">137</a> secretKey = +<a name="138" href="#138">138</a> getSecretKeyFromToken(secRef.getKeyIdentifierValue(), valueType, data); +<a name="139" href="#139">139</a> <strong class="jxr_keyword">if</strong> (secretKey == <strong class="jxr_keyword">null</strong>) { +<a name="140" href="#140">140</a> byte[] keyBytes = secRef.getSKIBytes(); +<a name="141" href="#141">141</a> List<WSSecurityEngineResult> resultsList = +<a name="142" href="#142">142</a> wsDocInfo.getResultsByTag(WSConstants.BST); +<a name="143" href="#143">143</a> <strong class="jxr_keyword">for</strong> (WSSecurityEngineResult bstResult : resultsList) { +<a name="144" href="#144">144</a> <a href="../../../../../org/apache/ws/security/message/token/BinarySecurity.html">BinarySecurity</a> bstToken = +<a name="145" href="#145">145</a> (<a href="../../../../../org/apache/ws/security/message/token/BinarySecurity.html">BinarySecurity</a>)bstResult.get(WSSecurityEngineResult.TAG_BINARY_SECURITY_TOKEN); +<a name="146" href="#146">146</a> byte[] tokenDigest = WSSecurityUtil.generateDigest(bstToken.getToken()); +<a name="147" href="#147">147</a> <strong class="jxr_keyword">if</strong> (Arrays.equals(tokenDigest, keyBytes)) { +<a name="148" href="#148">148</a> secretKey = (byte[])bstResult.get(WSSecurityEngineResult.TAG_SECRET); +<a name="149" href="#149">149</a> <strong class="jxr_keyword">break</strong>; +<a name="150" href="#150">150</a> } +<a name="151" href="#151">151</a> } +<a name="152" href="#152">152</a> } +<a name="153" href="#153">153</a> <strong class="jxr_keyword">if</strong> (secretKey == <strong class="jxr_keyword">null</strong>) { +<a name="154" href="#154">154</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>( +<a name="155" href="#155">155</a> WSSecurityException.FAILED_CHECK, <span class="jxr_string">"unsupportedKeyId"</span>, <strong class="jxr_keyword">new</strong> Object[] {uri} +<a name="156" href="#156">156</a> ); +<a name="157" href="#157">157</a> } +<a name="158" href="#158">158</a> } <strong class="jxr_keyword">else</strong> { +<a name="159" href="#159">159</a> <strong class="jxr_keyword">if</strong> (bspCompliant && SecurityTokenReference.ENC_KEY_SHA1_URI.equals(valueType)) { +<a name="160" href="#160">160</a> BSPEnforcer.checkEncryptedKeyBSPCompliance(secRef); +<a name="161" href="#161">161</a> } +<a name="162" href="#162">162</a> secretKey = +<a name="163" href="#163">163</a> getSecretKeyFromToken( +<a name="164" href="#164">164</a> secRef.getKeyIdentifierValue(), secRef.getKeyIdentifierValueType(), data +<a name="165" href="#165">165</a> ); +<a name="166" href="#166">166</a> <strong class="jxr_keyword">if</strong> (secretKey == <strong class="jxr_keyword">null</strong>) { +<a name="167" href="#167">167</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>( +<a name="168" href="#168">168</a> WSSecurityException.FAILED_CHECK, <span class="jxr_string">"unsupportedKeyId"</span>, <strong class="jxr_keyword">new</strong> Object[] {uri} +<a name="169" href="#169">169</a> ); +<a name="170" href="#170">170</a> } +<a name="171" href="#171">171</a> } +<a name="172" href="#172">172</a> } <strong class="jxr_keyword">else</strong> { +<a name="173" href="#173">173</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_CHECK, <span class="jxr_string">"noReference"</span>); +<a name="174" href="#174">174</a> } +<a name="175" href="#175">175</a> } +<a name="176" href="#176">176</a> +<a name="177" href="#177">177</a> <em class="jxr_javadoccomment">/**</em> +<a name="178" href="#178">178</a> <em class="jxr_javadoccomment"> * Get the X509Certificates associated with this SecurityTokenReference</em> +<a name="179" href="#179">179</a> <em class="jxr_javadoccomment"> * @return the X509Certificates associated with this SecurityTokenReference</em> +<a name="180" href="#180">180</a> <em class="jxr_javadoccomment"> */</em> +<a name="181" href="#181">181</a> <strong class="jxr_keyword">public</strong> X509Certificate[] getCertificates() { +<a name="182" href="#182">182</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>; +<a name="183" href="#183">183</a> } +<a name="184" href="#184">184</a> +<a name="185" href="#185">185</a> <em class="jxr_javadoccomment">/**</em> +<a name="186" href="#186">186</a> <em class="jxr_javadoccomment"> * Get the Principal associated with this SecurityTokenReference</em> +<a name="187" href="#187">187</a> <em class="jxr_javadoccomment"> * @return the Principal associated with this SecurityTokenReference</em> +<a name="188" href="#188">188</a> <em class="jxr_javadoccomment"> */</em> +<a name="189" href="#189">189</a> <strong class="jxr_keyword">public</strong> Principal getPrincipal() { +<a name="190" href="#190">190</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>; +<a name="191" href="#191">191</a> } +<a name="192" href="#192">192</a> +<a name="193" href="#193">193</a> <em class="jxr_javadoccomment">/**</em> +<a name="194" href="#194">194</a> <em class="jxr_javadoccomment"> * Get the PublicKey associated with this SecurityTokenReference</em> +<a name="195" href="#195">195</a> <em class="jxr_javadoccomment"> * @return the PublicKey associated with this SecurityTokenReference</em> +<a name="196" href="#196">196</a> <em class="jxr_javadoccomment"> */</em> +<a name="197" href="#197">197</a> <strong class="jxr_keyword">public</strong> PublicKey getPublicKey() { +<a name="198" href="#198">198</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>; +<a name="199" href="#199">199</a> } +<a name="200" href="#200">200</a> +<a name="201" href="#201">201</a> <em class="jxr_javadoccomment">/**</em> +<a name="202" href="#202">202</a> <em class="jxr_javadoccomment"> * Get the Secret Key associated with this SecurityTokenReference</em> +<a name="203" href="#203">203</a> <em class="jxr_javadoccomment"> * @return the Secret Key associated with this SecurityTokenReference</em> +<a name="204" href="#204">204</a> <em class="jxr_javadoccomment"> */</em> +<a name="205" href="#205">205</a> <strong class="jxr_keyword">public</strong> byte[] getSecretKey() { +<a name="206" href="#206">206</a> <strong class="jxr_keyword">return</strong> secretKey; +<a name="207" href="#207">207</a> } +<a name="208" href="#208">208</a> +<a name="209" href="#209">209</a> <em class="jxr_javadoccomment">/**</em> +<a name="210" href="#210">210</a> <em class="jxr_javadoccomment"> * Get whether the returned credential is already trusted or not. This is currently</em> +<a name="211" href="#211">211</a> <em class="jxr_javadoccomment"> * applicable in the case of a credential extracted from a trusted HOK SAML Assertion,</em> +<a name="212" href="#212">212</a> <em class="jxr_javadoccomment"> * and a BinarySecurityToken that has been processed by a Validator. In these cases,</em> +<a name="213" href="#213">213</a> <em class="jxr_javadoccomment"> * the SignatureProcessor does not need to verify trust on the credential.</em> +<a name="214" href="#214">214</a> <em class="jxr_javadoccomment"> * @return true if trust has already been verified on the returned Credential</em> +<a name="215" href="#215">215</a> <em class="jxr_javadoccomment"> */</em> +<a name="216" href="#216">216</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> isTrustedCredential() { +<a name="217" href="#217">217</a> <strong class="jxr_keyword">return</strong> false; +<a name="218" href="#218">218</a> } +<a name="219" href="#219">219</a> +<a name="220" href="#220">220</a> <em class="jxr_javadoccomment">/**</em> +<a name="221" href="#221">221</a> <em class="jxr_javadoccomment"> * Get the Secret Key from a CallbackHandler</em> +<a name="222" href="#222">222</a> <em class="jxr_javadoccomment"> * @param id The id of the element</em> +<a name="223" href="#223">223</a> <em class="jxr_javadoccomment"> * @param type The type of the element (may be null)</em> +<a name="224" href="#224">224</a> <em class="jxr_javadoccomment"> * @param cb The CallbackHandler object</em> +<a name="225" href="#225">225</a> <em class="jxr_javadoccomment"> * @return A Secret Key</em> +<a name="226" href="#226">226</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em> +<a name="227" href="#227">227</a> <em class="jxr_javadoccomment"> */</em> +<a name="228" href="#228">228</a> <strong class="jxr_keyword">private</strong> byte[] getSecretKeyFromToken( +<a name="229" href="#229">229</a> String id, +<a name="230" href="#230">230</a> String type, +<a name="231" href="#231">231</a> <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data +<a name="232" href="#232">232</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> { +<a name="233" href="#233">233</a> <strong class="jxr_keyword">if</strong> (id.charAt(0) == '#') { +<a name="234" href="#234">234</a> id = id.substring(1); +<a name="235" href="#235">235</a> } +<a name="236" href="#236">236</a> <a href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a> pwcb = +<a name="237" href="#237">237</a> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>(id, <strong class="jxr_keyword">null</strong>, type, WSPasswordCallback.SECRET_KEY, data); +<a name="238" href="#238">238</a> <strong class="jxr_keyword">try</strong> { +<a name="239" href="#239">239</a> Callback[] callbacks = <strong class="jxr_keyword">new</strong> Callback[]{pwcb}; +<a name="240" href="#240">240</a> <strong class="jxr_keyword">if</strong> (data.getCallbackHandler() != <strong class="jxr_keyword">null</strong>) { +<a name="241" href="#241">241</a> data.getCallbackHandler().handle(callbacks); +<a name="242" href="#242">242</a> <strong class="jxr_keyword">return</strong> pwcb.getKey(); +<a name="243" href="#243">243</a> } +<a name="244" href="#244">244</a> } <strong class="jxr_keyword">catch</strong> (Exception e) { +<a name="245" href="#245">245</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>( +<a name="246" href="#246">246</a> WSSecurityException.FAILURE, +<a name="247" href="#247">247</a> <span class="jxr_string">"noPassword"</span>, +<a name="248" href="#248">248</a> <strong class="jxr_keyword">new</strong> Object[] {id}, +<a name="249" href="#249">249</a> e +<a name="250" href="#250">250</a> ); +<a name="251" href="#251">251</a> } +<a name="252" href="#252">252</a> +<a name="253" href="#253">253</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>; +<a name="254" href="#254">254</a> } +<a name="255" href="#255">255</a> +<a name="256" href="#256">256</a> <em class="jxr_javadoccomment">/**</em> +<a name="257" href="#257">257</a> <em class="jxr_javadoccomment"> * Get a SecretKey from a SAML Assertion</em> +<a name="258" href="#258">258</a> <em class="jxr_javadoccomment"> */</em> +<a name="259" href="#259">259</a> <strong class="jxr_keyword">private</strong> byte[] getSecretKeyFromAssertion( +<a name="260" href="#260">260</a> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion, +<a name="261" href="#261">261</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef, +<a name="262" href="#262">262</a> <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data, +<a name="263" href="#263">263</a> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo, +<a name="264" href="#264">264</a> <strong class="jxr_keyword">boolean</strong> bspCompliant +<a name="265" href="#265">265</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> { +<a name="266" href="#266">266</a> <strong class="jxr_keyword">if</strong> (bspCompliant) { +<a name="267" href="#267">267</a> BSPEnforcer.checkSamlTokenBSPCompliance(secRef, assertion); +<a name="268" href="#268">268</a> } +<a name="269" href="#269">269</a> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> samlKi = +<a name="270" href="#270">270</a> SAMLUtil.getCredentialFromSubject(assertion, data, wsDocInfo, bspCompliant); +<a name="271" href="#271">271</a> <strong class="jxr_keyword">if</strong> (samlKi == <strong class="jxr_keyword">null</strong>) { +<a name="272" href="#272">272</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>( +<a name="273" href="#273">273</a> WSSecurityException.FAILED_CHECK, <span class="jxr_string">"invalidSAMLToken"</span>, <strong class="jxr_keyword">new</strong> Object[] {<span class="jxr_string">"No Secret Key"</span>} +<a name="274" href="#274">274</a> ); +<a name="275" href="#275">275</a> } +<a name="276" href="#276">276</a> <strong class="jxr_keyword">return</strong> samlKi.getSecret(); +<a name="277" href="#277">277</a> } +<a name="278" href="#278">278</a> +<a name="279" href="#279">279</a> <em class="jxr_javadoccomment">/**</em> +<a name="280" href="#280">280</a> <em class="jxr_javadoccomment"> * Process a previous security result</em> +<a name="281" href="#281">281</a> <em class="jxr_javadoccomment"> */</em> +<a name="282" href="#282">282</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">void</strong> processPreviousResult( +<a name="283" href="#283">283</a> <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a> result, +<a name="284" href="#284">284</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef, +<a name="285" href="#285">285</a> <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data, +<a name="286" href="#286">286</a> Map<String, Object> parameters, +<a name="287" href="#287">287</a> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo, +<a name="288" href="#288">288</a> <strong class="jxr_keyword">boolean</strong> bspCompliant +<a name="289" href="#289">289</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> { +<a name="290" href="#290">290</a> <strong class="jxr_keyword">int</strong> action = ((Integer)result.get(WSSecurityEngineResult.TAG_ACTION)).intValue(); +<a name="291" href="#291">291</a> <strong class="jxr_keyword">if</strong> (WSConstants.ENCR == action) { +<a name="292" href="#292">292</a> <strong class="jxr_keyword">if</strong> (bspCompliant) { +<a name="293" href="#293">293</a> BSPEnforcer.checkEncryptedKeyBSPCompliance(secRef); +<a name="294" href="#294">294</a> } +<a name="295" href="#295">295</a> secretKey = (byte[])result.get(WSSecurityEngineResult.TAG_SECRET); +<a name="296" href="#296">296</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (WSConstants.DKT == action) { +<a name="297" href="#297">297</a> <a href="../../../../../org/apache/ws/security/message/token/DerivedKeyToken.html">DerivedKeyToken</a> dkt = +<a name="298" href="#298">298</a> (<a href="../../../../../org/apache/ws/security/message/token/DerivedKeyToken.html">DerivedKeyToken</a>)result.get(WSSecurityEngineResult.TAG_DERIVED_KEY_TOKEN); +<a name="299" href="#299">299</a> byte[] secret = +<a name="300" href="#300">300</a> (byte[])result.get(WSSecurityEngineResult.TAG_SECRET); +<a name="301" href="#301">301</a> String algorithm = (String)parameters.get(SIGNATURE_METHOD); +<a name="302" href="#302">302</a> secretKey = dkt.deriveKey(WSSecurityUtil.getKeyLength(algorithm), secret); +<a name="303" href="#303">303</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (WSConstants.ST_UNSIGNED == action || WSConstants.ST_SIGNED == action) { +<a name="304" href="#304">304</a> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion = +<a name="305" href="#305">305</a> (<a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION); +<a name="306" href="#306">306</a> secretKey = +<a name="307" href="#307">307</a> getSecretKeyFromAssertion(assertion, secRef, data, wsDocInfo, bspCompliant); +<a name="308" href="#308">308</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (WSConstants.SCT == action || WSConstants.BST == action) { +<a name="309" href="#309">309</a> secretKey = (byte[])result.get(WSSecurityEngineResult.TAG_SECRET); +<a name="310" href="#310">310</a> } +<a name="311" href="#311">311</a> } +<a name="312" href="#312">312</a> +<a name="313" href="#313">313</a> +<a name="314" href="#314">314</a> } </pre> <hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body> </html>
