Author: giger
Date: Thu Nov 3 12:17:40 2011
New Revision: 1197077
URL: http://svn.apache.org/viewvc?rev=1197077&view=rev
Log:
cleanups and correction of KEYIDENTIFIER handling
Modified:
webservices/wss4j/branches/swssf/streaming-ws-policy/src/main/java/org/swssf/policy/assertionStates/TokenAssertionState.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/WSSec.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/ext/WSSConstants.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/ext/WSSUtils.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/BinarySecurityTokenOutputProcessor.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/DerivedKeyTokenOutputProcessor.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/EncryptedKeyOutputProcessor.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/SAMLTokenOutputProcessor.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/SignatureEndingOutputProcessor.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/securityToken/SecurityTokenFactoryImpl.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/DerivedKeyTokenTest.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/EncDecryptionTest.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/SignatureTest.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/saml/SAMLTokenReferenceTest.java
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/saml/SAMLTokenSVTest.java
Modified:
webservices/wss4j/branches/swssf/streaming-ws-policy/src/main/java/org/swssf/policy/assertionStates/TokenAssertionState.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-policy/src/main/java/org/swssf/policy/assertionStates/TokenAssertionState.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-policy/src/main/java/org/swssf/policy/assertionStates/TokenAssertionState.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-policy/src/main/java/org/swssf/policy/assertionStates/TokenAssertionState.java
Thu Nov 3 12:17:40 2011
@@ -247,7 +247,7 @@ public class TokenAssertionState extends
} else if (x509Token.isRequireIssuerSerialReference() &&
delegatingSecurityToken.getKeyIdentifierType() !=
WSSConstants.KeyIdentifierType.ISSUER_SERIAL) {
setAsserted(false);
setErrorMessage("Policy enforces IssuerSerialReference but we
got " + delegatingSecurityToken.getTokenType());
- } else if (x509Token.isRequireEmbeddedTokenReference() &&
delegatingSecurityToken.getKeyIdentifierType() !=
WSSConstants.KeyIdentifierType.BST_EMBEDDED) {
+ } else if (x509Token.isRequireEmbeddedTokenReference() &&
delegatingSecurityToken.getKeyIdentifierType() !=
WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE) {
setAsserted(false);
setErrorMessage("Policy enforces EmbeddedTokenReference but we
got " + delegatingSecurityToken.getTokenType());
} else if (x509Token.isRequireThumbprintReference() &&
delegatingSecurityToken.getKeyIdentifierType() !=
WSSConstants.KeyIdentifierType.THUMBPRINT_IDENTIFIER) {
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/WSSec.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/WSSec.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/WSSec.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/WSSec.java
Thu Nov 3 12:17:40 2011
@@ -240,7 +240,7 @@ public class WSSec {
if (securityProperties.getSignatureCanonicalizationAlgorithm()
== null) {
securityProperties.setSignatureCanonicalizationAlgorithm("http://www.w3.org/2001/10/xml-exc-c14n#");
}
-
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.EMBEDDED_SECURITY_TOKEN_REF);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
if (securityProperties.getEncryptionSymAlgorithm() == null) {
securityProperties.setEncryptionSymAlgorithm("http://www.w3.org/2001/04/xmlenc#aes256-cbc");
}
@@ -260,7 +260,7 @@ public class WSSec {
securityProperties.setDerivedKeyTokenReference(WSSConstants.DerivedKeyTokenReference.DirectReference);
}
if (securityProperties.getDerivedKeyTokenReference() !=
WSSConstants.DerivedKeyTokenReference.DirectReference) {
-
securityProperties.setDerivedKeyKeyIdentifierType(WSSConstants.KeyIdentifierType.EMBEDDED_SECURITY_TOKEN_REF);
+
securityProperties.setDerivedKeyKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
}
} else if (action.equals(WSSConstants.ENCRYPT_WITH_DERIVED_KEY)) {
if (securityProperties.getCallbackHandler() == null) {
@@ -299,7 +299,7 @@ public class WSSec {
securityProperties.setDerivedKeyTokenReference(WSSConstants.DerivedKeyTokenReference.EncryptedKey);
}
if (securityProperties.getDerivedKeyTokenReference() !=
WSSConstants.DerivedKeyTokenReference.DirectReference) {
-
securityProperties.setDerivedKeyKeyIdentifierType(WSSConstants.KeyIdentifierType.EMBEDDED_SECURITY_TOKEN_REF);
+
securityProperties.setDerivedKeyKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
}
} else if (action.equals(WSSConstants.SAML_TOKEN_SIGNED)) {
if (securityProperties.getCallbackHandler() == null) {
@@ -319,7 +319,7 @@ public class WSSec {
securityProperties.setSignatureCanonicalizationAlgorithm("http://www.w3.org/2001/10/xml-exc-c14n#");
}
if (securityProperties.getSignatureKeyIdentifierType() ==
null) {
-
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.EMBEDDED_SECURITY_TOKEN_REF);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
}
} else if (action.equals(WSSConstants.SAML_TOKEN_UNSIGNED)) {
if (securityProperties.getCallbackHandler() == null) {
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/ext/WSSConstants.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/ext/WSSConstants.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/ext/WSSConstants.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/ext/WSSConstants.java
Thu Nov 3 12:17:40 2011
@@ -253,15 +253,12 @@ public class WSSConstants extends XMLSec
}
public enum KeyIdentifierType {
- DEFAULT_TOKEN,
ISSUER_SERIAL,
- BST_DIRECT_REFERENCE,
- BST_EMBEDDED,
+ SECURITY_TOKEN_DIRECT_REFERENCE,
X509_KEY_IDENTIFIER,
SKI_KEY_IDENTIFIER,
THUMBPRINT_IDENTIFIER,
- EMBEDDED_SECURITY_TOKEN_REF,
- EMEDDED_KEYIDENTIFIER_REF,
+ EMBEDDED_KEYIDENTIFIER_REF,
USERNAMETOKEN_REFERENCE,
}
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/ext/WSSUtils.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/ext/WSSUtils.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/ext/WSSUtils.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/ext/WSSUtils.java
Thu Nov 3 12:17:40 2011
@@ -204,7 +204,11 @@ public class WSSUtils extends XMLSecurit
outputProcessorChain.reset();
}
- public static void
createBinarySecurityTokenStructure(AbstractOutputProcessor
abstractOutputProcessor, OutputProcessorChain outputProcessorChain, String
referenceId, X509Certificate[] x509Certificates, boolean useSingleCertificate)
throws XMLStreamException, XMLSecurityException {
+ public static void
createBinarySecurityTokenStructure(AbstractOutputProcessor
abstractOutputProcessor,
+ OutputProcessorChain
outputProcessorChain,
+ String referenceId,
X509Certificate[] x509Certificates,
+ boolean
useSingleCertificate)
+ throws XMLStreamException, XMLSecurityException {
Map<QName, String> attributes = new HashMap<QName, String>();
String valueType;
if (useSingleCertificate) {
@@ -236,7 +240,10 @@ public class WSSUtils extends XMLSecurit
abstractOutputProcessor.createEndElementAndOutputAsEvent(outputProcessorChain,
WSSConstants.TAG_wsse_BinarySecurityToken);
}
- public static void
createX509SubjectKeyIdentifierStructure(AbstractOutputProcessor
abstractOutputProcessor, OutputProcessorChain outputProcessorChain,
X509Certificate[] x509Certificates) throws XMLSecurityException,
XMLStreamException {
+ public static void
createX509SubjectKeyIdentifierStructure(AbstractOutputProcessor
abstractOutputProcessor,
+
OutputProcessorChain outputProcessorChain,
+
X509Certificate[] x509Certificates)
+ throws XMLSecurityException, XMLStreamException {
// As per the 1.1 specification, SKI can only be used for a V3
certificate
if (x509Certificates[0].getVersion() != 3) {
throw new
XMLSecurityException(XMLSecurityException.ErrorCode.FAILED_SIGNATURE,
"invalidCertForSKI");
@@ -251,7 +258,10 @@ public class WSSUtils extends XMLSecurit
abstractOutputProcessor.createEndElementAndOutputAsEvent(outputProcessorChain,
WSSConstants.TAG_wsse_KeyIdentifier);
}
- public static void
createX509KeyIdentifierStructure(AbstractOutputProcessor
abstractOutputProcessor, OutputProcessorChain outputProcessorChain,
X509Certificate[] x509Certificates) throws XMLStreamException,
XMLSecurityException {
+ public static void
createX509KeyIdentifierStructure(AbstractOutputProcessor
abstractOutputProcessor,
+ OutputProcessorChain
outputProcessorChain,
+ X509Certificate[]
x509Certificates)
+ throws XMLStreamException, XMLSecurityException {
Map<QName, String> attributes = new HashMap<QName, String>();
attributes.put(WSSConstants.ATT_NULL_EncodingType,
WSSConstants.SOAPMESSAGE_NS10_BASE64_ENCODING);
attributes.put(WSSConstants.ATT_NULL_ValueType,
WSSConstants.NS_X509_V3_TYPE);
@@ -264,7 +274,10 @@ public class WSSUtils extends XMLSecurit
abstractOutputProcessor.createEndElementAndOutputAsEvent(outputProcessorChain,
WSSConstants.TAG_wsse_KeyIdentifier);
}
- public static void
createThumbprintKeyIdentifierStructure(AbstractOutputProcessor
abstractOutputProcessor, OutputProcessorChain outputProcessorChain,
X509Certificate[] x509Certificates) throws XMLStreamException,
XMLSecurityException {
+ public static void
createThumbprintKeyIdentifierStructure(AbstractOutputProcessor
abstractOutputProcessor,
+
OutputProcessorChain outputProcessorChain,
+
X509Certificate[] x509Certificates)
+ throws XMLStreamException, XMLSecurityException {
Map<QName, String> attributes = new HashMap<QName, String>();
attributes.put(WSSConstants.ATT_NULL_EncodingType,
WSSConstants.SOAPMESSAGE_NS10_BASE64_ENCODING);
attributes.put(WSSConstants.ATT_NULL_ValueType,
WSSConstants.NS_THUMBPRINT);
@@ -285,32 +298,23 @@ public class WSSUtils extends XMLSecurit
abstractOutputProcessor.createEndElementAndOutputAsEvent(outputProcessorChain,
WSSConstants.TAG_wsse_KeyIdentifier);
}
- public static void createBSTReferenceStructure(AbstractOutputProcessor
abstractOutputProcessor, OutputProcessorChain outputProcessorChain, String
referenceId, X509Certificate[] x509Certificates, boolean useSingleCertificate,
boolean embed) throws XMLStreamException, XMLSecurityException {
+ public static void createBSTReferenceStructure(AbstractOutputProcessor
abstractOutputProcessor,
+ OutputProcessorChain
outputProcessorChain, String referenceId,
+ String valueType)
+ throws XMLStreamException, XMLSecurityException {
Map<QName, String> attributes = new HashMap<QName, String>();
- String valueType;
- if (useSingleCertificate) {
- valueType = WSSConstants.NS_X509_V3_TYPE;
- } else {
- valueType = WSSConstants.NS_X509PKIPathv1;
- }
attributes.put(WSSConstants.ATT_NULL_URI, "#" + referenceId);
- attributes.put(WSSConstants.ATT_NULL_ValueType, valueType);
-
abstractOutputProcessor.createStartElementAndOutputAsEvent(outputProcessorChain,
WSSConstants.TAG_wsse_Reference, attributes);
- if (embed) {
-
WSSUtils.createBinarySecurityTokenStructure(abstractOutputProcessor,
outputProcessorChain, referenceId, x509Certificates, useSingleCertificate);
+ if (valueType != null) {
+ attributes.put(WSSConstants.ATT_NULL_ValueType, valueType);
}
-
abstractOutputProcessor.createEndElementAndOutputAsEvent(outputProcessorChain,
WSSConstants.TAG_wsse_Reference);
- }
-
- //todo I think this is not spec conform and can be dropped
- public static void
createEmbeddedSecurityTokenReferenceStructure(AbstractOutputProcessor
abstractOutputProcessor, OutputProcessorChain outputProcessorChain, String
referenceId) throws XMLStreamException, XMLSecurityException {
- Map<QName, String> attributes = new HashMap<QName, String>();
- attributes.put(WSSConstants.ATT_NULL_URI, "#" + referenceId);
abstractOutputProcessor.createStartElementAndOutputAsEvent(outputProcessorChain,
WSSConstants.TAG_wsse_Reference, attributes);
abstractOutputProcessor.createEndElementAndOutputAsEvent(outputProcessorChain,
WSSConstants.TAG_wsse_Reference);
}
- public static void
createEmbeddedKeyIdentifierStructure(AbstractOutputProcessor
abstractOutputProcessor, OutputProcessorChain outputProcessorChain,
XMLSecurityConstants.TokenType tokenType, String referenceId) throws
XMLStreamException, XMLSecurityException {
+ public static void
createEmbeddedKeyIdentifierStructure(AbstractOutputProcessor
abstractOutputProcessor,
+
OutputProcessorChain outputProcessorChain,
+
XMLSecurityConstants.TokenType tokenType, String referenceId)
+ throws XMLStreamException, XMLSecurityException {
Map<QName, String> attributes = new HashMap<QName, String>();
if (tokenType.equals(WSSConstants.Saml10Token) ||
tokenType.equals(WSSConstants.Saml11Token)) {
attributes.put(WSSConstants.ATT_NULL_ValueType,
WSSConstants.NS_SAML10_TYPE);
@@ -322,7 +326,9 @@ public class WSSUtils extends XMLSecurit
abstractOutputProcessor.createEndElementAndOutputAsEvent(outputProcessorChain,
WSSConstants.TAG_wsse_KeyIdentifier);
}
- public static void
createUsernameTokenReferenceStructure(AbstractOutputProcessor
abstractOutputProcessor, OutputProcessorChain outputProcessorChain, String
tokenId) throws XMLStreamException, XMLSecurityException {
+ public static void
createUsernameTokenReferenceStructure(AbstractOutputProcessor
abstractOutputProcessor,
+
OutputProcessorChain outputProcessorChain, String tokenId)
+ throws XMLStreamException, XMLSecurityException {
Map<QName, String> attributes = new HashMap<QName, String>();
attributes.put(WSSConstants.ATT_NULL_URI, "#" + tokenId);
attributes.put(WSSConstants.ATT_NULL_ValueType,
WSSConstants.NS_USERNAMETOKEN_PROFILE_UsernameToken);
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/BinarySecurityTokenOutputProcessor.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/BinarySecurityTokenOutputProcessor.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/BinarySecurityTokenOutputProcessor.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/BinarySecurityTokenOutputProcessor.java
Thu Nov 3 12:17:40 2011
@@ -153,7 +153,7 @@ public class BinarySecurityTokenOutputPr
if (action.equals(WSSConstants.SIGNATURE)
|| action.equals(WSSConstants.SAML_TOKEN_SIGNED)) {
outputProcessorChain.getSecurityContext().put(WSSConstants.PROP_USE_THIS_TOKEN_ID_FOR_SIGNATURE,
bstId);
- if (((WSSSecurityProperties)
getSecurityProperties()).getSignatureKeyIdentifierType() ==
WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE) {
+ if (((WSSSecurityProperties)
getSecurityProperties()).getSignatureKeyIdentifierType() ==
WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE) {
outputProcessorChain.getSecurityContext().put(WSSConstants.PROP_APPEND_SIGNATURE_ON_THIS_ID,
bstId);
FinalBinarySecurityTokenOutputProcessor
finalBinarySecurityTokenOutputProcessor = new
FinalBinarySecurityTokenOutputProcessor(getSecurityProperties(), getAction(),
binarySecurityToken);
finalBinarySecurityTokenOutputProcessor.getBeforeProcessors().add(org.swssf.wss.impl.processor.output.SignatureOutputProcessor.class.getName());
@@ -162,7 +162,7 @@ public class BinarySecurityTokenOutputPr
}
} else if (action.equals(WSSConstants.ENCRYPT)) {
outputProcessorChain.getSecurityContext().put(WSSConstants.PROP_USE_THIS_TOKEN_ID_FOR_ENCRYPTED_KEY,
bstId);
- if (((WSSSecurityProperties)
getSecurityProperties()).getEncryptionKeyIdentifierType() ==
WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE) {
+ if (((WSSSecurityProperties)
getSecurityProperties()).getEncryptionKeyIdentifierType() ==
WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE) {
FinalBinarySecurityTokenOutputProcessor
finalBinarySecurityTokenOutputProcessor = new
FinalBinarySecurityTokenOutputProcessor(getSecurityProperties(), getAction(),
binarySecurityToken);
finalBinarySecurityTokenOutputProcessor.getAfterProcessors().add(org.swssf.wss.impl.processor.output.EncryptEndingOutputProcessor.class.getName());
outputProcessorChain.addProcessor(finalBinarySecurityTokenOutputProcessor);
@@ -184,15 +184,6 @@ public class BinarySecurityTokenOutputPr
outputProcessorChain.getSecurityContext().put(WSSConstants.PROP_USE_THIS_TOKEN_ID_FOR_SECURITYCONTEXTTOKEN,
bstId);
break;
}
- if ((getAction() == WSSConstants.ENCRYPT_WITH_DERIVED_KEY
- && ((WSSSecurityProperties)
getSecurityProperties()).getEncryptionKeyIdentifierType() ==
WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE)
- || (getAction() ==
WSSConstants.SIGNATURE_WITH_DERIVED_KEY
- && ((WSSSecurityProperties)
getSecurityProperties()).getSignatureKeyIdentifierType() ==
WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE)) {
- FinalBinarySecurityTokenOutputProcessor
finalBinarySecurityTokenOutputProcessor = new
FinalBinarySecurityTokenOutputProcessor(getSecurityProperties(), getAction(),
binarySecurityToken);
-
finalBinarySecurityTokenOutputProcessor.getAfterProcessors().add(org.swssf.wss.impl.processor.output.EncryptEndingOutputProcessor.class.getName());
-
outputProcessorChain.addProcessor(finalBinarySecurityTokenOutputProcessor);
-
binarySecurityToken.setProcessor(finalBinarySecurityTokenOutputProcessor);
- }
}
outputProcessorChain.getSecurityContext().registerSecurityTokenProvider(bstId,
binarySecurityTokenProvider);
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/DerivedKeyTokenOutputProcessor.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/DerivedKeyTokenOutputProcessor.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/DerivedKeyTokenOutputProcessor.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/DerivedKeyTokenOutputProcessor.java
Thu Nov 3 12:17:40 2011
@@ -266,9 +266,7 @@ public class DerivedKeyTokenOutputProces
Map<QName, String> attributes = new HashMap<QName, String>();
attributes.put(WSSConstants.ATT_wsu_Id, "STRId-" +
UUID.randomUUID().toString());
- if ((keyIdentifierType ==
WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE
- || keyIdentifierType ==
WSSConstants.KeyIdentifierType.BST_EMBEDDED)
- && !useSingleCertificate) {
+ if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE &&
!useSingleCertificate) {
attributes.put(WSSConstants.ATT_wsse11_TokenType,
WSSConstants.NS_X509PKIPathv1);
} else if (derivedKeyTokenReference ==
WSSConstants.DerivedKeyTokenReference.EncryptedKey) {
attributes.put(WSSConstants.ATT_wsse11_TokenType,
WSSConstants.NS_WSS_ENC_KEY_VALUE_TYPE);
@@ -286,12 +284,14 @@ public class DerivedKeyTokenOutputProces
WSSUtils.createX509KeyIdentifierStructure(this,
outputProcessorChain, x509Certificates);
} else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.THUMBPRINT_IDENTIFIER) {
WSSUtils.createThumbprintKeyIdentifierStructure(this,
outputProcessorChain, x509Certificates);
- } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.BST_EMBEDDED) {
- WSSUtils.createBSTReferenceStructure(this,
outputProcessorChain, tokenId, x509Certificates, useSingleCertificate, true);
- } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE) {
- WSSUtils.createBSTReferenceStructure(this,
outputProcessorChain, tokenId, x509Certificates, useSingleCertificate, false);
- } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.EMBEDDED_SECURITY_TOKEN_REF) {
- WSSUtils.createEmbeddedSecurityTokenReferenceStructure(this,
outputProcessorChain, tokenId);
+ } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE) {
+ String valueType;
+ if (useSingleCertificate) {
+ valueType = WSSConstants.NS_X509_V3_TYPE;
+ } else {
+ valueType = WSSConstants.NS_X509PKIPathv1;
+ }
+ WSSUtils.createBSTReferenceStructure(this,
outputProcessorChain, tokenId, valueType);
} else {
throw new
XMLSecurityException(XMLSecurityException.ErrorCode.FAILED_ENCRYPTION,
"unsupportedSecurityToken", keyIdentifierType.name());
}
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/EncryptedKeyOutputProcessor.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/EncryptedKeyOutputProcessor.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/EncryptedKeyOutputProcessor.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/EncryptedKeyOutputProcessor.java
Thu Nov 3 12:17:40 2011
@@ -277,9 +277,7 @@ public class EncryptedKeyOutputProcessor
Map<QName, String> attributes = new HashMap<QName, String>();
attributes.put(WSSConstants.ATT_wsu_Id, "STRId-" +
UUID.randomUUID().toString());
- if
((keyIdentifierType.name().equals(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE.name())
- ||
keyIdentifierType.name().equals(WSSConstants.KeyIdentifierType.BST_EMBEDDED.name()))
- && !useSingleCertificate) {
+ if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE &&
!useSingleCertificate) {
attributes.put(WSSConstants.ATT_wsse11_TokenType,
WSSConstants.NS_X509PKIPathv1);
}
createStartElementAndOutputAsEvent(outputProcessorChain,
WSSConstants.TAG_wsse_SecurityTokenReference, attributes);
@@ -287,20 +285,22 @@ public class EncryptedKeyOutputProcessor
X509Certificate[] x509Certificates =
securityToken.getKeyWrappingToken().getX509Certificates();
String tokenId = securityToken.getKeyWrappingToken().getId();
- if
(keyIdentifierType.name().equals(WSSConstants.KeyIdentifierType.ISSUER_SERIAL.name()))
{
+ if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.ISSUER_SERIAL) {
createX509IssuerSerialStructure(outputProcessorChain,
x509Certificates);
- } else if
(keyIdentifierType.name().equals(WSSConstants.KeyIdentifierType.SKI_KEY_IDENTIFIER.name()))
{
+ } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.SKI_KEY_IDENTIFIER) {
WSSUtils.createX509SubjectKeyIdentifierStructure(this,
outputProcessorChain, x509Certificates);
- } else if
(keyIdentifierType.name().equals(WSSConstants.KeyIdentifierType.X509_KEY_IDENTIFIER.name()))
{
+ } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.X509_KEY_IDENTIFIER) {
WSSUtils.createX509KeyIdentifierStructure(this,
outputProcessorChain, x509Certificates);
- } else if
(keyIdentifierType.name().equals(WSSConstants.KeyIdentifierType.THUMBPRINT_IDENTIFIER.name()))
{
+ } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.THUMBPRINT_IDENTIFIER) {
WSSUtils.createThumbprintKeyIdentifierStructure(this,
outputProcessorChain, x509Certificates);
- } else if
(keyIdentifierType.name().equals(WSSConstants.KeyIdentifierType.BST_EMBEDDED.name()))
{
- WSSUtils.createBSTReferenceStructure(this,
outputProcessorChain, tokenId, x509Certificates, useSingleCertificate, true);
- } else if
(keyIdentifierType.name().equals(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE.name()))
{
- WSSUtils.createBSTReferenceStructure(this,
outputProcessorChain, tokenId, x509Certificates, useSingleCertificate, false);
- } else if
(keyIdentifierType.name().equals(WSSConstants.KeyIdentifierType.EMBEDDED_SECURITY_TOKEN_REF.name()))
{
- WSSUtils.createEmbeddedSecurityTokenReferenceStructure(this,
outputProcessorChain, tokenId);
+ } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE) {
+ String valueType;
+ if (useSingleCertificate) {
+ valueType = WSSConstants.NS_X509_V3_TYPE;
+ } else {
+ valueType = WSSConstants.NS_X509PKIPathv1;
+ }
+ WSSUtils.createBSTReferenceStructure(this,
outputProcessorChain, tokenId, valueType);
} else {
throw new
XMLSecurityException(XMLSecurityException.ErrorCode.FAILED_ENCRYPTION,
"unsupportedSecurityToken", keyIdentifierType.name());
}
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/SAMLTokenOutputProcessor.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/SAMLTokenOutputProcessor.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/SAMLTokenOutputProcessor.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/SAMLTokenOutputProcessor.java
Thu Nov 3 12:17:40 2011
@@ -258,7 +258,7 @@ public class SAMLTokenOutputProcessor ex
StartElement startElement = xmlEvent.asStartElement();
if (((WSSDocumentContext)
outputProcessorChain.getDocumentContext()).isInSecurityHeader() &&
startElement.getName().equals(WSSConstants.TAG_wsse_Security)) {
OutputProcessorChain subOutputProcessorChain =
outputProcessorChain.createSubChain(this);
- if (senderVouches && ((WSSSecurityProperties)
getSecurityProperties()).getSignatureKeyIdentifierType() ==
WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE) {
+ if (senderVouches && ((WSSSecurityProperties)
getSecurityProperties()).getSignatureKeyIdentifierType() ==
WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE) {
WSSUtils.createBinarySecurityTokenStructure(this,
outputProcessorChain, binarySecurityTokenReferenceId,
securityToken.getX509Certificates(), getSecurityProperties().isUseSingleCert());
}
outputSamlAssertion(samlAssertionWrapper.toDOM(null),
subOutputProcessorChain);
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/SignatureEndingOutputProcessor.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/SignatureEndingOutputProcessor.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/SignatureEndingOutputProcessor.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/processor/output/SignatureEndingOutputProcessor.java
Thu Nov 3 12:17:40 2011
@@ -91,9 +91,7 @@ public class SignatureEndingOutputProces
Map<QName, String> attributes = new HashMap<QName, String>();
attributes.put(WSSConstants.ATT_wsu_Id, "STRId-" +
UUID.randomUUID().toString());
- if ((keyIdentifierType ==
WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE
- || keyIdentifierType ==
WSSConstants.KeyIdentifierType.BST_EMBEDDED)
- && !useSingleCertificate) {
+ if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE &&
!useSingleCertificate) {
attributes.put(WSSConstants.ATT_wsse11_TokenType,
WSSConstants.NS_X509PKIPathv1);
} else if
(WSSConstants.Saml10Token.equals(securityToken.getTokenType())
||
WSSConstants.Saml11Token.equals(securityToken.getTokenType())) {
@@ -114,13 +112,15 @@ public class SignatureEndingOutputProces
WSSUtils.createX509KeyIdentifierStructure(this,
outputProcessorChain, x509Certificates);
} else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.THUMBPRINT_IDENTIFIER) {
WSSUtils.createThumbprintKeyIdentifierStructure(this,
outputProcessorChain, x509Certificates);
- } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.BST_EMBEDDED) {
- WSSUtils.createBSTReferenceStructure(this, outputProcessorChain,
tokenId, x509Certificates, useSingleCertificate, true);
- } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE) {
- WSSUtils.createBSTReferenceStructure(this, outputProcessorChain,
tokenId, x509Certificates, useSingleCertificate, false);
- } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.EMBEDDED_SECURITY_TOKEN_REF) {
- WSSUtils.createEmbeddedSecurityTokenReferenceStructure(this,
outputProcessorChain, tokenId);
- } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.EMEDDED_KEYIDENTIFIER_REF) {
+ } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE) {
+ String valueType;
+ if (useSingleCertificate) {
+ valueType = WSSConstants.NS_X509_V3_TYPE;
+ } else {
+ valueType = WSSConstants.NS_X509PKIPathv1;
+ }
+ WSSUtils.createBSTReferenceStructure(this, outputProcessorChain,
tokenId, valueType);
+ } else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.EMBEDDED_KEYIDENTIFIER_REF) {
WSSUtils.createEmbeddedKeyIdentifierStructure(this,
outputProcessorChain, securityToken.getTokenType(), tokenId);
} else if (keyIdentifierType ==
WSSConstants.KeyIdentifierType.USERNAMETOKEN_REFERENCE) {
WSSUtils.createUsernameTokenReferenceStructure(this,
outputProcessorChain, tokenId);
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/securityToken/SecurityTokenFactoryImpl.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/securityToken/SecurityTokenFactoryImpl.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/securityToken/SecurityTokenFactoryImpl.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/main/java/org/swssf/wss/impl/securityToken/SecurityTokenFactoryImpl.java
Thu Nov 3 12:17:40 2011
@@ -107,14 +107,7 @@ public class SecurityTokenFactoryImpl ex
throw new WSSecurityException("badReferenceURI");
}
uri = WSSUtils.dropReferenceMarker(uri);
- //embedded BST:
- //todo? this seems not to be schema valid!
- /*BinarySecurityTokenType binarySecurityTokenType =
XMLSecurityUtils.getQNameType(referenceType, WSSConstants.TAG_dsig_X509Data)
- if (referenceType.getBinarySecurityTokenType() != null
- &&
uri.equals(referenceType.getBinarySecurityTokenType().getId())) {
- BinarySecurityTokenType binarySecurityTokenType =
referenceType.getBinarySecurityTokenType();
- return new
DelegatingSecurityToken(WSSConstants.KeyIdentifierType.BST_EMBEDDED,
getSecurityToken(binarySecurityTokenType, securityContext, crypto,
callbackHandler, processor));
- } else {//referenced BST:*/
+ //referenced BST:*/
//we have to search BST somewhere in the doc. First we will
check for a BST already processed and
//stored in the context. Otherwise we will abort now.
@@ -133,9 +126,8 @@ public class SecurityTokenFactoryImpl ex
if (securityTokenProvider == null) {
throw new
WSSecurityException(WSSecurityException.ErrorCode.SECURITY_TOKEN_UNAVAILABLE,
"noToken", uri);
}
- return new
DelegatingSecurityToken(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE,
securityTokenProvider.getSecurityToken(crypto));
+ return new
DelegatingSecurityToken(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE,
securityTokenProvider.getSecurityToken(crypto));
}
- //}
throw new
WSSecurityException(WSSecurityException.ErrorCode.INVALID_SECURITY,
"noKeyinfo");
} finally {
securityContext.remove("" + Thread.currentThread().hashCode());
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/DerivedKeyTokenTest.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/DerivedKeyTokenTest.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/DerivedKeyTokenTest.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/DerivedKeyTokenTest.java
Thu Nov 3 12:17:40 2011
@@ -527,6 +527,7 @@ public class DerivedKeyTokenTest extends
securityProperties.loadEncryptionKeystore(this.getClass().getClassLoader().getResource("receiver.jks"),
"default".toCharArray());
securityProperties.setEncryptionUser("receiver");
securityProperties.setEncryptionKeyIdentifierType(WSSConstants.KeyIdentifierType.THUMBPRINT_IDENTIFIER);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.THUMBPRINT_IDENTIFIER);
securityProperties.setDerivedKeyTokenReference(WSSConstants.DerivedKeyTokenReference.EncryptedKey);
OutboundWSSec wsSecOut =
WSSec.getOutboundWSSec(securityProperties);
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/EncDecryptionTest.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/EncDecryptionTest.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/EncDecryptionTest.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/EncDecryptionTest.java
Thu Nov 3 12:17:40 2011
@@ -520,7 +520,7 @@ public class EncDecryptionTest extends A
securityProperties.setOutAction(actions);
securityProperties.loadEncryptionKeystore(this.getClass().getClassLoader().getResource("transmitter.jks"),
"default".toCharArray());
securityProperties.setEncryptionUser("receiver");
-
securityProperties.setEncryptionKeyIdentifierType(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE);
+
securityProperties.setEncryptionKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
InputStream sourceDocument =
this.getClass().getClassLoader().getResourceAsStream("testdata/plain-soap-1.1.xml");
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/SignatureTest.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/SignatureTest.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/SignatureTest.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/SignatureTest.java
Thu Nov 3 12:17:40 2011
@@ -428,7 +428,7 @@ public class SignatureTest extends Abstr
securityProperties.setOutAction(actions);
securityProperties.loadSignatureKeyStore(this.getClass().getClassLoader().getResource("transmitter.jks"),
"default".toCharArray());
securityProperties.setSignatureUser("transmitter");
-
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
securityProperties.setCallbackHandler(new
org.swssf.wss.test.CallbackHandlerImpl());
OutboundWSSec wsSecOut =
WSSec.getOutboundWSSec(securityProperties);
@@ -805,7 +805,7 @@ public class SignatureTest extends Abstr
securityProperties.loadSignatureKeyStore(this.getClass().getClassLoader().getResource("transmitter.jks"),
"default".toCharArray());
securityProperties.setSignatureUser("transmitter");
securityProperties.setUseSingleCert(false);
-
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
securityProperties.setCallbackHandler(new CallbackHandlerImpl());
OutboundWSSec wsSecOut =
WSSec.getOutboundWSSec(securityProperties);
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/saml/SAMLTokenReferenceTest.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/saml/SAMLTokenReferenceTest.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/saml/SAMLTokenReferenceTest.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/saml/SAMLTokenReferenceTest.java
Thu Nov 3 12:17:40 2011
@@ -456,7 +456,7 @@ public class SAMLTokenReferenceTest exte
crypto.setKeyStore(keyStore);
callbackHandler.setCerts(crypto.getCertificates("transmitter"));
securityProperties.setCallbackHandler(callbackHandler);
-
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.EMEDDED_KEYIDENTIFIER_REF);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.EMBEDDED_KEYIDENTIFIER_REF);
securityProperties.loadSignatureKeyStore(this.getClass().getClassLoader().getResource("transmitter.jks"),
"default".toCharArray());
securityProperties.setSignatureUser("transmitter");
@@ -540,7 +540,7 @@ public class SAMLTokenReferenceTest exte
crypto.setKeyStore(keyStore);
callbackHandler.setCerts(crypto.getCertificates("transmitter"));
securityProperties.setCallbackHandler(callbackHandler);
-
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
securityProperties.loadSignatureKeyStore(this.getClass().getClassLoader().getResource("transmitter.jks"),
"default".toCharArray());
securityProperties.setSignatureUser("transmitter");
Modified:
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/saml/SAMLTokenSVTest.java
URL:
http://svn.apache.org/viewvc/webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/saml/SAMLTokenSVTest.java?rev=1197077&r1=1197076&r2=1197077&view=diff
==============================================================================
---
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/saml/SAMLTokenSVTest.java
(original)
+++
webservices/wss4j/branches/swssf/streaming-ws-security/src/test/java/org/swssf/wss/test/saml/SAMLTokenSVTest.java
Thu Nov 3 12:17:40 2011
@@ -68,7 +68,7 @@ public class SAMLTokenSVTest extends Abs
securityProperties.setCallbackHandler(callbackHandler);
securityProperties.loadSignatureKeyStore(this.getClass().getClassLoader().getResource("transmitter.jks"),
"default".toCharArray());
securityProperties.setSignatureUser("transmitter");
-
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
OutboundWSSec wsSecOut =
WSSec.getOutboundWSSec(securityProperties);
XMLStreamWriter xmlStreamWriter = wsSecOut.processOutMessage(baos,
"UTF-8", new ArrayList<SecurityEvent>());
@@ -247,7 +247,7 @@ public class SAMLTokenSVTest extends Abs
securityProperties.setCallbackHandler(callbackHandler);
securityProperties.loadSignatureKeyStore(this.getClass().getClassLoader().getResource("transmitter.jks"),
"default".toCharArray());
securityProperties.setSignatureUser("transmitter");
-
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
OutboundWSSec wsSecOut =
WSSec.getOutboundWSSec(securityProperties);
XMLStreamWriter xmlStreamWriter = wsSecOut.processOutMessage(baos,
"UTF-8", new ArrayList<SecurityEvent>());
@@ -334,7 +334,7 @@ public class SAMLTokenSVTest extends Abs
securityProperties.setCallbackHandler(callbackHandler);
securityProperties.loadSignatureKeyStore(this.getClass().getClassLoader().getResource("transmitter.jks"),
"default".toCharArray());
securityProperties.setSignatureUser("transmitter");
-
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
OutboundWSSec wsSecOut =
WSSec.getOutboundWSSec(securityProperties);
XMLStreamWriter xmlStreamWriter = wsSecOut.processOutMessage(baos,
"UTF-8", new ArrayList<SecurityEvent>());
@@ -423,7 +423,7 @@ public class SAMLTokenSVTest extends Abs
securityProperties.setCallbackHandler(callbackHandler);
securityProperties.loadSignatureKeyStore(this.getClass().getClassLoader().getResource("transmitter.jks"),
"default".toCharArray());
securityProperties.setSignatureUser("transmitter");
-
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.BST_DIRECT_REFERENCE);
+
securityProperties.setSignatureKeyIdentifierType(WSSConstants.KeyIdentifierType.SECURITY_TOKEN_DIRECT_REFERENCE);
OutboundWSSec wsSecOut =
WSSec.getOutboundWSSec(securityProperties);
XMLStreamWriter xmlStreamWriter = wsSecOut.processOutMessage(baos,
"UTF-8", new ArrayList<SecurityEvent>());