You are viewing a plain text version of this content. The canonical link for it is here.
Posted to wss4j-dev@ws.apache.org by co...@apache.org on 2009/04/20 15:56:38 UTC
svn commit: r766696 [27/36] - in /webservices/wss4j/site: ./ apidocs/
apidocs/org/apache/ws/axis/security/
apidocs/org/apache/ws/axis/security/class-use/
apidocs/org/apache/ws/axis/security/handler/
apidocs/org/apache/ws/axis/security/handler/class-use...
Modified: webservices/wss4j/site/xref/org/apache/ws/security/message/token/SecurityTokenReference.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/message/token/SecurityTokenReference.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/message/token/SecurityTokenReference.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/message/token/SecurityTokenReference.html Mon Apr 20 13:56:25 2009
@@ -163,525 +163,622 @@
<a name="153" href="#153">153</a> Element tokElement = <strong class="jxr_keyword">null</strong>;
<a name="154" href="#154">154</a> String tmpS = WSConstants.WSS_SAML_NS + WSConstants.WSS_SAML_ASSERTION;
<a name="155" href="#155">155</a> String saml10 = WSConstants.WSS_SAML_NS + WSConstants.SAML_ASSERTION_ID;
-<a name="156" href="#156">156</a>
-<a name="157" href="#157">157</a> <strong class="jxr_keyword">if</strong> (tmpS.equals(ref.getValueType())
-<a name="158" href="#158">158</a> || saml10.equals(ref.getValueType())
-<a name="159" href="#159">159</a> || WSConstants.WSC_SCT.equals(ref.getValueType())) {
-<a name="160" href="#160">160</a> Element sa = docInfo.getAssertion();
-<a name="161" href="#161">161</a> String saID = <strong class="jxr_keyword">null</strong>;
-<a name="162" href="#162">162</a> <strong class="jxr_keyword">if</strong> (sa != <strong class="jxr_keyword">null</strong>) {
-<a name="163" href="#163">163</a> saID = sa.getAttribute(<span class="jxr_string">"AssertionID"</span>);
-<a name="164" href="#164">164</a> }
-<a name="165" href="#165">165</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="166" href="#166">166</a> log.debug(<span class="jxr_string">"SAML token ID: "</span> + saID);
-<a name="167" href="#167">167</a> }
-<a name="168" href="#168">168</a> String id = uri;
-<a name="169" href="#169">169</a> <strong class="jxr_keyword">if</strong> (id.charAt(0) == '#') {
-<a name="170" href="#170">170</a> id = id.substring(1);
-<a name="171" href="#171">171</a> }
-<a name="172" href="#172">172</a> <strong class="jxr_keyword">if</strong> (saID == <strong class="jxr_keyword">null</strong> || !saID.equals(id)) {
-<a name="173" href="#173">173</a> <strong class="jxr_keyword">if</strong> (cb != <strong class="jxr_keyword">null</strong>) {
-<a name="174" href="#174">174</a> <em class="jxr_comment">//try to find a custom token</em>
-<a name="175" href="#175">175</a> <a href="../../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a> pwcb =
-<a name="176" href="#176">176</a> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>(id, WSPasswordCallback.CUSTOM_TOKEN);
-<a name="177" href="#177">177</a> <strong class="jxr_keyword">try</strong> {
-<a name="178" href="#178">178</a> cb.handle(<strong class="jxr_keyword">new</strong> Callback[]{pwcb});
-<a name="179" href="#179">179</a> } <strong class="jxr_keyword">catch</strong> (Exception e) {
-<a name="180" href="#180">180</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="181" href="#181">181</a> WSSecurityException.FAILURE,
-<a name="182" href="#182">182</a> <span class="jxr_string">"noPassword"</span>,
-<a name="183" href="#183">183</a> <strong class="jxr_keyword">new</strong> Object[] {id},
-<a name="184" href="#184">184</a> e
-<a name="185" href="#185">185</a> );
-<a name="186" href="#186">186</a> }
-<a name="187" href="#187">187</a>
-<a name="188" href="#188">188</a> Element assertionElem = pwcb.getCustomToken();
-<a name="189" href="#189">189</a> <strong class="jxr_keyword">if</strong> (assertionElem != <strong class="jxr_keyword">null</strong>) {
-<a name="190" href="#190">190</a> sa = (Element)doc.importNode(assertionElem, <strong class="jxr_keyword">true</strong>);
-<a name="191" href="#191">191</a> }
-<a name="192" href="#192">192</a> <strong class="jxr_keyword">else</strong> {
-<a name="193" href="#193">193</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="194" href="#194">194</a> WSSecurityException.INVALID_SECURITY,
-<a name="195" href="#195">195</a> <span class="jxr_string">"badReferenceURI"</span>,
-<a name="196" href="#196">196</a> <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"uri:"</span> + uri + <span class="jxr_string">", saID: "</span> + saID}
-<a name="197" href="#197">197</a> );
-<a name="198" href="#198">198</a> }
-<a name="199" href="#199">199</a> } <strong class="jxr_keyword">else</strong> {
-<a name="200" href="#200">200</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="201" href="#201">201</a> WSSecurityException.INVALID_SECURITY,
-<a name="202" href="#202">202</a> <span class="jxr_string">"badReferenceURI"</span>,
-<a name="203" href="#203">203</a> <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"uri:"</span> + uri + <span class="jxr_string">", saID: "</span> + saID}
-<a name="204" href="#204">204</a> );
-<a name="205" href="#205">205</a> }
-<a name="206" href="#206">206</a> }
-<a name="207" href="#207">207</a> tokElement = sa;
-<a name="208" href="#208">208</a> } <strong class="jxr_keyword">else</strong> {
-<a name="209" href="#209">209</a> tokElement = WSSecurityUtil.getElementByWsuId(doc, uri);
-<a name="210" href="#210">210</a>
-<a name="211" href="#211">211</a> <em class="jxr_comment">// In some scenarios id is used rather than wsu:Id</em>
-<a name="212" href="#212">212</a> <strong class="jxr_keyword">if</strong> (tokElement == <strong class="jxr_keyword">null</strong>) {
-<a name="213" href="#213">213</a> tokElement = WSSecurityUtil.getElementByGenId(doc, uri);
-<a name="214" href="#214">214</a> }
-<a name="215" href="#215">215</a>
-<a name="216" href="#216">216</a> }
-<a name="217" href="#217">217</a> <strong class="jxr_keyword">if</strong> (tokElement == <strong class="jxr_keyword">null</strong>) {
-<a name="218" href="#218">218</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="219" href="#219">219</a> WSSecurityException.SECURITY_TOKEN_UNAVAILABLE,
-<a name="220" href="#220">220</a> <span class="jxr_string">"noToken"</span>,
-<a name="221" href="#221">221</a> <strong class="jxr_keyword">new</strong> Object[]{uri}
-<a name="222" href="#222">222</a> );
-<a name="223" href="#223">223</a> }
-<a name="224" href="#224">224</a> <strong class="jxr_keyword">return</strong> tokElement;
-<a name="225" href="#225">225</a> }
-<a name="226" href="#226">226</a>
-<a name="227" href="#227">227</a>
-<a name="228" href="#228">228</a> <em class="jxr_javadoccomment">/**</em>
-<a name="229" href="#229">229</a> <em class="jxr_javadoccomment"> * Sets the KeyIdentifier Element as a X509 certificate.</em>
-<a name="230" href="#230">230</a> <em class="jxr_javadoccomment"> * Takes a X509 certificate, converts its data into base 64 and inserts</em>
-<a name="231" href="#231">231</a> <em class="jxr_javadoccomment"> * it into a <code>wsse:KeyIdentifier</code> element, which is placed</em>
-<a name="232" href="#232">232</a> <em class="jxr_javadoccomment"> * in the <code>wsse:SecurityTokenReference</code> element.</em>
-<a name="233" href="#233">233</a> <em class="jxr_javadoccomment"> *</em>
-<a name="234" href="#234">234</a> <em class="jxr_javadoccomment"> * @param cert is the X509 certificate to be inserted as key identifier</em>
-<a name="235" href="#235">235</a> <em class="jxr_javadoccomment"> */</em>
-<a name="236" href="#236">236</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyIdentifier(X509Certificate cert)
-<a name="237" href="#237">237</a> <strong class="jxr_keyword">throws</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="238" href="#238">238</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
-<a name="239" href="#239">239</a> byte data[] = <strong class="jxr_keyword">null</strong>;
-<a name="240" href="#240">240</a> <strong class="jxr_keyword">try</strong> {
-<a name="241" href="#241">241</a> data = cert.getEncoded();
-<a name="242" href="#242">242</a> } <strong class="jxr_keyword">catch</strong> (CertificateEncodingException e) {
-<a name="243" href="#243">243</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="244" href="#244">244</a> WSSecurityException.SECURITY_TOKEN_UNAVAILABLE, <span class="jxr_string">"encodeError"</span>, <strong class="jxr_keyword">null</strong>, e
-<a name="245" href="#245">245</a> );
-<a name="246" href="#246">246</a> }
-<a name="247" href="#247">247</a> Text text = doc.createTextNode(Base64.encode(data));
-<a name="248" href="#248">248</a>
-<a name="249" href="#249">249</a> createKeyIdentifier(doc, X509Security.X509_V3_TYPE, text, <strong class="jxr_keyword">true</strong>);
-<a name="250" href="#250">250</a> }
-<a name="251" href="#251">251</a>
-<a name="252" href="#252">252</a> <em class="jxr_javadoccomment">/**</em>
-<a name="253" href="#253">253</a> <em class="jxr_javadoccomment"> * Sets the KeyIdentifier Element as a X509 Subject-Key-Identifier (SKI).</em>
-<a name="254" href="#254">254</a> <em class="jxr_javadoccomment"> * Takes a X509 certificate, gets it SKI data, converts into base 64 and</em>
-<a name="255" href="#255">255</a> <em class="jxr_javadoccomment"> * inserts it into a <code>wsse:KeyIdentifier</code> element, which is placed</em>
-<a name="256" href="#256">256</a> <em class="jxr_javadoccomment"> * in the <code>wsse:SecurityTokenReference</code> element.</em>
-<a name="257" href="#257">257</a> <em class="jxr_javadoccomment"> *</em>
-<a name="258" href="#258">258</a> <em class="jxr_javadoccomment"> * @param cert is the X509 certificate to get the SKI</em>
-<a name="259" href="#259">259</a> <em class="jxr_javadoccomment"> * @param crypto is the Crypto implementation. Used to read SKI info bytes from certificate</em>
-<a name="260" href="#260">260</a> <em class="jxr_javadoccomment"> */</em>
-<a name="261" href="#261">261</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyIdentifierSKI(X509Certificate cert, <a href="../../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto)
-<a name="262" href="#262">262</a> <strong class="jxr_keyword">throws</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="263" href="#263">263</a> <em class="jxr_comment">//</em>
-<a name="264" href="#264">264</a> <em class="jxr_comment">// As per the 1.1 specification, SKI can only be used for a V3 certificate</em>
-<a name="265" href="#265">265</a> <em class="jxr_comment">//</em>
-<a name="266" href="#266">266</a> <strong class="jxr_keyword">if</strong> (cert.getVersion() != 3) {
-<a name="267" href="#267">267</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="268" href="#268">268</a> WSSecurityException.UNSUPPORTED_SECURITY_TOKEN,
-<a name="269" href="#269">269</a> <span class="jxr_string">"invalidCertForSKI"</span>,
-<a name="270" href="#270">270</a> <strong class="jxr_keyword">new</strong> Object[]{<strong class="jxr_keyword">new</strong> Integer(cert.getVersion())}
-<a name="271" href="#271">271</a> );
-<a name="272" href="#272">272</a> }
-<a name="273" href="#273">273</a>
-<a name="274" href="#274">274</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
-<a name="275" href="#275">275</a> byte data[] = crypto.getSKIBytesFromCert(cert);
-<a name="276" href="#276">276</a>
-<a name="277" href="#277">277</a> org.w3c.dom.Text text = doc.createTextNode(Base64.encode(data));
-<a name="278" href="#278">278</a> createKeyIdentifier(doc, SKI_URI, text, <strong class="jxr_keyword">true</strong>);
-<a name="279" href="#279">279</a> }
-<a name="280" href="#280">280</a>
-<a name="281" href="#281">281</a> <em class="jxr_javadoccomment">/**</em>
-<a name="282" href="#282">282</a> <em class="jxr_javadoccomment"> * Sets the KeyIdentifier Element as a Thumbprint.</em>
-<a name="283" href="#283">283</a> <em class="jxr_javadoccomment"> * </em>
-<a name="284" href="#284">284</a> <em class="jxr_javadoccomment"> * Takes a X509 certificate, computes its thumbprint using SHA-1, converts</em>
-<a name="285" href="#285">285</a> <em class="jxr_javadoccomment"> * into base 64 and inserts it into a <code>wsse:KeyIdentifier</code></em>
-<a name="286" href="#286">286</a> <em class="jxr_javadoccomment"> * element, which is placed in the <code>wsse:SecurityTokenReference</code></em>
-<a name="287" href="#287">287</a> <em class="jxr_javadoccomment"> * element.</em>
-<a name="288" href="#288">288</a> <em class="jxr_javadoccomment"> * </em>
-<a name="289" href="#289">289</a> <em class="jxr_javadoccomment"> * @param cert is the X509 certificate to get the thumbprint</em>
-<a name="290" href="#290">290</a> <em class="jxr_javadoccomment"> */</em>
-<a name="291" href="#291">291</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyIdentifierThumb(X509Certificate cert) <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="292" href="#292">292</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
-<a name="293" href="#293">293</a> MessageDigest sha = <strong class="jxr_keyword">null</strong>;
-<a name="294" href="#294">294</a> <strong class="jxr_keyword">try</strong> {
-<a name="295" href="#295">295</a> sha = MessageDigest.getInstance(<span class="jxr_string">"SHA-1"</span>);
-<a name="296" href="#296">296</a> } <strong class="jxr_keyword">catch</strong> (NoSuchAlgorithmException e1) {
-<a name="297" href="#297">297</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="298" href="#298">298</a> WSSecurityException.FAILURE, <span class="jxr_string">"noSHA1availabe"</span>, <strong class="jxr_keyword">null</strong>, e1
-<a name="299" href="#299">299</a> );
-<a name="300" href="#300">300</a> }
-<a name="301" href="#301">301</a> sha.reset();
-<a name="302" href="#302">302</a> <strong class="jxr_keyword">try</strong> {
-<a name="303" href="#303">303</a> sha.update(cert.getEncoded());
-<a name="304" href="#304">304</a> } <strong class="jxr_keyword">catch</strong> (CertificateEncodingException e1) {
-<a name="305" href="#305">305</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="306" href="#306">306</a> WSSecurityException.SECURITY_TOKEN_UNAVAILABLE, <span class="jxr_string">"encodeError"</span>, <strong class="jxr_keyword">null</strong>, e1
-<a name="307" href="#307">307</a> );
-<a name="308" href="#308">308</a> }
-<a name="309" href="#309">309</a> byte[] data = sha.digest();
-<a name="310" href="#310">310</a>
-<a name="311" href="#311">311</a> org.w3c.dom.Text text = doc.createTextNode(Base64.encode(data));
-<a name="312" href="#312">312</a> createKeyIdentifier(doc, THUMB_URI, text, <strong class="jxr_keyword">true</strong>);
-<a name="313" href="#313">313</a> }
-<a name="314" href="#314">314</a>
-<a name="315" href="#315">315</a>
-<a name="316" href="#316">316</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyIdentifierEncKeySHA1(String value) <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="317" href="#317">317</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
-<a name="318" href="#318">318</a> org.w3c.dom.Text text = doc.createTextNode(value);
-<a name="319" href="#319">319</a> createKeyIdentifier(doc, ENC_KEY_SHA1_URI, text, <strong class="jxr_keyword">true</strong>);
-<a name="320" href="#320">320</a> }
-<a name="321" href="#321">321</a>
-<a name="322" href="#322">322</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setSAMLKeyIdentifier(String keyIdVal) <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="323" href="#323">323</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
-<a name="324" href="#324">324</a> createKeyIdentifier(doc, SAML_ID_URI, doc.createTextNode(keyIdVal), false);
-<a name="325" href="#325">325</a> }
-<a name="326" href="#326">326</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyIdentifier(String valueType, String keyIdVal) <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="327" href="#327">327</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
-<a name="328" href="#328">328</a> createKeyIdentifier(doc, valueType, doc.createTextNode(keyIdVal), false);
-<a name="329" href="#329">329</a> }
-<a name="330" href="#330">330</a>
-<a name="331" href="#331">331</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">void</strong> createKeyIdentifier(Document doc, String uri, Node node, <strong class="jxr_keyword">boolean</strong> base64) {
-<a name="332" href="#332">332</a> Element keyId = doc.createElementNS(WSConstants.WSSE_NS, <span class="jxr_string">"wsse:KeyIdentifier"</span>);
-<a name="333" href="#333">333</a> keyId.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"ValueType"</span>, uri);
-<a name="334" href="#334">334</a> <strong class="jxr_keyword">if</strong> (base64) {
-<a name="335" href="#335">335</a> keyId.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"EncodingType"</span>, BinarySecurity.BASE64_ENCODING);
-<a name="336" href="#336">336</a> }
-<a name="337" href="#337">337</a>
-<a name="338" href="#338">338</a> keyId.appendChild(node);
-<a name="339" href="#339">339</a> Element elem = getFirstElement();
-<a name="340" href="#340">340</a> <strong class="jxr_keyword">if</strong> (elem != <strong class="jxr_keyword">null</strong>) {
-<a name="341" href="#341">341</a> <strong class="jxr_keyword">this</strong>.element.replaceChild(keyId, elem);
-<a name="342" href="#342">342</a> } <strong class="jxr_keyword">else</strong> {
-<a name="343" href="#343">343</a> <strong class="jxr_keyword">this</strong>.element.appendChild(keyId);
-<a name="344" href="#344">344</a> }
-<a name="345" href="#345">345</a> }
-<a name="346" href="#346">346</a>
-<a name="347" href="#347">347</a>
-<a name="348" href="#348">348</a> <em class="jxr_javadoccomment">/**</em>
-<a name="349" href="#349">349</a> <em class="jxr_javadoccomment"> * get the first child element.</em>
-<a name="350" href="#350">350</a> <em class="jxr_javadoccomment"> *</em>
-<a name="351" href="#351">351</a> <em class="jxr_javadoccomment"> * @return the first <code>Element</code> child node</em>
-<a name="352" href="#352">352</a> <em class="jxr_javadoccomment"> */</em>
-<a name="353" href="#353">353</a> <strong class="jxr_keyword">public</strong> Element getFirstElement() {
-<a name="354" href="#354">354</a> <strong class="jxr_keyword">for</strong> (Node currentChild = <strong class="jxr_keyword">this</strong>.element.getFirstChild();
-<a name="355" href="#355">355</a> currentChild != <strong class="jxr_keyword">null</strong>;
-<a name="356" href="#356">356</a> currentChild = currentChild.getNextSibling()
-<a name="357" href="#357">357</a> ) {
-<a name="358" href="#358">358</a> <strong class="jxr_keyword">if</strong> (currentChild instanceof Element) {
-<a name="359" href="#359">359</a> <strong class="jxr_keyword">return</strong> (Element) currentChild;
-<a name="360" href="#360">360</a> }
-<a name="361" href="#361">361</a> }
-<a name="362" href="#362">362</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="363" href="#363">363</a> }
-<a name="364" href="#364">364</a>
-<a name="365" href="#365">365</a> <em class="jxr_javadoccomment">/**</em>
-<a name="366" href="#366">366</a> <em class="jxr_javadoccomment"> * Gets the KeyIdentifier.</em>
-<a name="367" href="#367">367</a> <em class="jxr_javadoccomment"> *</em>
-<a name="368" href="#368">368</a> <em class="jxr_javadoccomment"> * @return the the X509 certificate or zero if a unknown key identifier</em>
-<a name="369" href="#369">369</a> <em class="jxr_javadoccomment"> * type was detected.</em>
-<a name="370" href="#370">370</a> <em class="jxr_javadoccomment"> */</em>
-<a name="371" href="#371">371</a> <strong class="jxr_keyword">public</strong> X509Certificate[] getKeyIdentifier(<a href="../../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="372" href="#372">372</a> Element elem = getFirstElement();
-<a name="373" href="#373">373</a> String value = elem.getAttribute(<span class="jxr_string">"ValueType"</span>);
-<a name="374" href="#374">374</a> String alias = <strong class="jxr_keyword">null</strong>;
-<a name="375" href="#375">375</a>
-<a name="376" href="#376">376</a> <strong class="jxr_keyword">if</strong> (X509Security.X509_V3_TYPE.equals(value)) {
-<a name="377" href="#377">377</a> X509Security token = <strong class="jxr_keyword">new</strong> X509Security(elem);
-<a name="378" href="#378">378</a> <strong class="jxr_keyword">if</strong> (token != <strong class="jxr_keyword">null</strong>) {
-<a name="379" href="#379">379</a> X509Certificate cert = token.getX509Certificate(crypto);
-<a name="380" href="#380">380</a> X509Certificate[] certs = <strong class="jxr_keyword">new</strong> X509Certificate[1];
-<a name="381" href="#381">381</a> certs[0] = cert;
-<a name="382" href="#382">382</a> <strong class="jxr_keyword">return</strong> certs;
-<a name="383" href="#383">383</a> }
-<a name="384" href="#384">384</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (SKI_URI.equals(value)) {
-<a name="385" href="#385">385</a> alias = getX509SKIAlias(crypto);
-<a name="386" href="#386">386</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (THUMB_URI.equals(value)) {
-<a name="387" href="#387">387</a> Node node = getFirstElement().getFirstChild();
-<a name="388" href="#388">388</a> <strong class="jxr_keyword">if</strong> (node == <strong class="jxr_keyword">null</strong>) {
-<a name="389" href="#389">389</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="390" href="#390">390</a> }
-<a name="391" href="#391">391</a> <strong class="jxr_keyword">if</strong> (node.getNodeType() == Node.TEXT_NODE) {
-<a name="392" href="#392">392</a> byte[] thumb = Base64.decode(((Text) node).getData());
-<a name="393" href="#393">393</a> alias = crypto.getAliasForX509CertThumb(thumb);
-<a name="394" href="#394">394</a> }
-<a name="395" href="#395">395</a> }
-<a name="396" href="#396">396</a>
-<a name="397" href="#397">397</a> <strong class="jxr_keyword">if</strong> (alias != <strong class="jxr_keyword">null</strong>) {
-<a name="398" href="#398">398</a> <strong class="jxr_keyword">return</strong> crypto.getCertificates(alias);
-<a name="399" href="#399">399</a> }
-<a name="400" href="#400">400</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="401" href="#401">401</a> }
-<a name="402" href="#402">402</a>
-<a name="403" href="#403">403</a> <strong class="jxr_keyword">public</strong> String getKeyIdentifierValue() {
-<a name="404" href="#404">404</a> <strong class="jxr_keyword">if</strong> (containsKeyIdentifier()) {
-<a name="405" href="#405">405</a> Node node = getFirstElement().getFirstChild();
-<a name="406" href="#406">406</a> <strong class="jxr_keyword">if</strong> (node == <strong class="jxr_keyword">null</strong>) {
-<a name="407" href="#407">407</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="408" href="#408">408</a> }
-<a name="409" href="#409">409</a> <strong class="jxr_keyword">if</strong> (node.getNodeType() == Node.TEXT_NODE) {
-<a name="410" href="#410">410</a> <strong class="jxr_keyword">return</strong> ((Text) node).getData();
-<a name="411" href="#411">411</a> }
-<a name="412" href="#412">412</a> }
-<a name="413" href="#413">413</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="414" href="#414">414</a> }
-<a name="415" href="#415">415</a>
-<a name="416" href="#416">416</a> <strong class="jxr_keyword">public</strong> String getKeyIdentifierValueType() {
-<a name="417" href="#417">417</a> <strong class="jxr_keyword">if</strong> (containsKeyIdentifier()) {
-<a name="418" href="#418">418</a> Element elem = getFirstElement();
-<a name="419" href="#419">419</a> <strong class="jxr_keyword">return</strong> elem.getAttribute(<span class="jxr_string">"ValueType"</span>);
-<a name="420" href="#420">420</a> }
-<a name="421" href="#421">421</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="156" href="#156">156</a> <strong class="jxr_keyword">if</strong> (tmpS.equals(ref.getValueType())
+<a name="157" href="#157">157</a> || saml10.equals(ref.getValueType())
+<a name="158" href="#158">158</a> || WSConstants.WSC_SCT.equals(ref.getValueType())) {
+<a name="159" href="#159">159</a> Element sa = docInfo.getAssertion();
+<a name="160" href="#160">160</a> String saID = <strong class="jxr_keyword">null</strong>;
+<a name="161" href="#161">161</a> <strong class="jxr_keyword">if</strong> (sa != <strong class="jxr_keyword">null</strong>) {
+<a name="162" href="#162">162</a> saID = sa.getAttribute(<span class="jxr_string">"AssertionID"</span>);
+<a name="163" href="#163">163</a> }
+<a name="164" href="#164">164</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="165" href="#165">165</a> log.debug(<span class="jxr_string">"SAML token ID: "</span> + saID);
+<a name="166" href="#166">166</a> }
+<a name="167" href="#167">167</a> String id = uri;
+<a name="168" href="#168">168</a> <strong class="jxr_keyword">if</strong> (id.charAt(0) == '#') {
+<a name="169" href="#169">169</a> id = id.substring(1);
+<a name="170" href="#170">170</a> }
+<a name="171" href="#171">171</a> <strong class="jxr_keyword">if</strong> (saID == <strong class="jxr_keyword">null</strong> || !saID.equals(id)) {
+<a name="172" href="#172">172</a> <strong class="jxr_keyword">if</strong> (cb != <strong class="jxr_keyword">null</strong>) {
+<a name="173" href="#173">173</a> <em class="jxr_comment">//try to find a custom token</em>
+<a name="174" href="#174">174</a> <a href="../../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a> pwcb =
+<a name="175" href="#175">175</a> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>(id, WSPasswordCallback.CUSTOM_TOKEN);
+<a name="176" href="#176">176</a> <strong class="jxr_keyword">try</strong> {
+<a name="177" href="#177">177</a> cb.handle(<strong class="jxr_keyword">new</strong> Callback[]{pwcb});
+<a name="178" href="#178">178</a> } <strong class="jxr_keyword">catch</strong> (Exception e) {
+<a name="179" href="#179">179</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="180" href="#180">180</a> WSSecurityException.FAILURE,
+<a name="181" href="#181">181</a> <span class="jxr_string">"noPassword"</span>,
+<a name="182" href="#182">182</a> <strong class="jxr_keyword">new</strong> Object[] {id},
+<a name="183" href="#183">183</a> e
+<a name="184" href="#184">184</a> );
+<a name="185" href="#185">185</a> }
+<a name="186" href="#186">186</a>
+<a name="187" href="#187">187</a> Element assertionElem = pwcb.getCustomToken();
+<a name="188" href="#188">188</a> <strong class="jxr_keyword">if</strong> (assertionElem != <strong class="jxr_keyword">null</strong>) {
+<a name="189" href="#189">189</a> sa = (Element)doc.importNode(assertionElem, <strong class="jxr_keyword">true</strong>);
+<a name="190" href="#190">190</a> }
+<a name="191" href="#191">191</a> <strong class="jxr_keyword">else</strong> {
+<a name="192" href="#192">192</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="193" href="#193">193</a> WSSecurityException.INVALID_SECURITY,
+<a name="194" href="#194">194</a> <span class="jxr_string">"badReferenceURI"</span>,
+<a name="195" href="#195">195</a> <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"uri:"</span> + uri + <span class="jxr_string">", saID: "</span> + saID}
+<a name="196" href="#196">196</a> );
+<a name="197" href="#197">197</a> }
+<a name="198" href="#198">198</a> } <strong class="jxr_keyword">else</strong> {
+<a name="199" href="#199">199</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="200" href="#200">200</a> WSSecurityException.INVALID_SECURITY,
+<a name="201" href="#201">201</a> <span class="jxr_string">"badReferenceURI"</span>,
+<a name="202" href="#202">202</a> <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"uri:"</span> + uri + <span class="jxr_string">", saID: "</span> + saID}
+<a name="203" href="#203">203</a> );
+<a name="204" href="#204">204</a> }
+<a name="205" href="#205">205</a> }
+<a name="206" href="#206">206</a> tokElement = sa;
+<a name="207" href="#207">207</a> } <strong class="jxr_keyword">else</strong> {
+<a name="208" href="#208">208</a> tokElement = WSSecurityUtil.getElementByWsuId(doc, uri);
+<a name="209" href="#209">209</a>
+<a name="210" href="#210">210</a> <em class="jxr_comment">// In some scenarios id is used rather than wsu:Id</em>
+<a name="211" href="#211">211</a> <strong class="jxr_keyword">if</strong> (tokElement == <strong class="jxr_keyword">null</strong>) {
+<a name="212" href="#212">212</a> tokElement = WSSecurityUtil.getElementByGenId(doc, uri);
+<a name="213" href="#213">213</a> }
+<a name="214" href="#214">214</a>
+<a name="215" href="#215">215</a> }
+<a name="216" href="#216">216</a> <strong class="jxr_keyword">if</strong> (tokElement == <strong class="jxr_keyword">null</strong>) {
+<a name="217" href="#217">217</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="218" href="#218">218</a> WSSecurityException.SECURITY_TOKEN_UNAVAILABLE,
+<a name="219" href="#219">219</a> <span class="jxr_string">"noToken"</span>,
+<a name="220" href="#220">220</a> <strong class="jxr_keyword">new</strong> Object[]{uri}
+<a name="221" href="#221">221</a> );
+<a name="222" href="#222">222</a> }
+<a name="223" href="#223">223</a> <strong class="jxr_keyword">return</strong> tokElement;
+<a name="224" href="#224">224</a> }
+<a name="225" href="#225">225</a>
+<a name="226" href="#226">226</a>
+<a name="227" href="#227">227</a> <em class="jxr_javadoccomment">/**</em>
+<a name="228" href="#228">228</a> <em class="jxr_javadoccomment"> * Gets the signing token element, which may be a <code>BinarySecurityToken</em>
+<a name="229" href="#229">229</a> <em class="jxr_javadoccomment"> * </code> or a SAML token.</em>
+<a name="230" href="#230">230</a> <em class="jxr_javadoccomment"> * </em>
+<a name="231" href="#231">231</a> <em class="jxr_javadoccomment"> * The method gets the value of the KeyIdentifier contained in</em>
+<a name="232" href="#232">232</a> <em class="jxr_javadoccomment"> * the {@link SecurityTokenReference} and tries to find the referenced</em>
+<a name="233" href="#233">233</a> <em class="jxr_javadoccomment"> * Element in the document.</em>
+<a name="234" href="#234">234</a> <em class="jxr_javadoccomment"> *</em>
+<a name="235" href="#235">235</a> <em class="jxr_javadoccomment"> * @param doc the document that contains the binary security token</em>
+<a name="236" href="#236">236</a> <em class="jxr_javadoccomment"> * element. This could be different from the document</em>
+<a name="237" href="#237">237</a> <em class="jxr_javadoccomment"> * that contains the SecurityTokenReference (STR). See</em>
+<a name="238" href="#238">238</a> <em class="jxr_javadoccomment"> * STRTransform.derefenceBST() method</em>
+<a name="239" href="#239">239</a> <em class="jxr_javadoccomment"> * @return Element containing the signing token</em>
+<a name="240" href="#240">240</a> <em class="jxr_javadoccomment"> */</em>
+<a name="241" href="#241">241</a> <strong class="jxr_keyword">public</strong> Element getKeyIdentifierTokenElement(
+<a name="242" href="#242">242</a> Document doc, <a href="../../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo, CallbackHandler cb
+<a name="243" href="#243">243</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="244" href="#244">244</a> String value = getKeyIdentifierValue();
+<a name="245" href="#245">245</a> String type = getKeyIdentifierValueType();
+<a name="246" href="#246">246</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="247" href="#247">247</a> log.debug(<span class="jxr_string">"Token reference uri: "</span> + value);
+<a name="248" href="#248">248</a> }
+<a name="249" href="#249">249</a> <strong class="jxr_keyword">if</strong> (value == <strong class="jxr_keyword">null</strong>) {
+<a name="250" href="#250">250</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="251" href="#251">251</a> WSSecurityException.INVALID_SECURITY, <span class="jxr_string">"badReferenceURI"</span>
+<a name="252" href="#252">252</a> );
+<a name="253" href="#253">253</a> }
+<a name="254" href="#254">254</a> Element tokElement = <strong class="jxr_keyword">null</strong>;
+<a name="255" href="#255">255</a> String saml10 = WSConstants.WSS_SAML_NS + WSConstants.SAML_ASSERTION_ID;
+<a name="256" href="#256">256</a> <strong class="jxr_keyword">if</strong> (saml10.equals(type)
+<a name="257" href="#257">257</a> || WSConstants.WSC_SCT.equals(type)) {
+<a name="258" href="#258">258</a> Element sa = docInfo.getAssertion();
+<a name="259" href="#259">259</a> String saID = <strong class="jxr_keyword">null</strong>;
+<a name="260" href="#260">260</a> <strong class="jxr_keyword">if</strong> (sa != <strong class="jxr_keyword">null</strong>) {
+<a name="261" href="#261">261</a> saID = sa.getAttribute(<span class="jxr_string">"AssertionID"</span>);
+<a name="262" href="#262">262</a> }
+<a name="263" href="#263">263</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="264" href="#264">264</a> log.debug(<span class="jxr_string">"SAML token ID: "</span> + saID);
+<a name="265" href="#265">265</a> }
+<a name="266" href="#266">266</a> String id = value;
+<a name="267" href="#267">267</a> <strong class="jxr_keyword">if</strong> (id.charAt(0) == '#') {
+<a name="268" href="#268">268</a> id = id.substring(1);
+<a name="269" href="#269">269</a> }
+<a name="270" href="#270">270</a> <strong class="jxr_keyword">if</strong> (saID == <strong class="jxr_keyword">null</strong> || !saID.equals(id)) {
+<a name="271" href="#271">271</a> <strong class="jxr_keyword">if</strong> (cb != <strong class="jxr_keyword">null</strong>) {
+<a name="272" href="#272">272</a> <em class="jxr_comment">//try to find a custom token</em>
+<a name="273" href="#273">273</a> <a href="../../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a> pwcb =
+<a name="274" href="#274">274</a> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>(id, WSPasswordCallback.CUSTOM_TOKEN);
+<a name="275" href="#275">275</a> <strong class="jxr_keyword">try</strong> {
+<a name="276" href="#276">276</a> cb.handle(<strong class="jxr_keyword">new</strong> Callback[]{pwcb});
+<a name="277" href="#277">277</a> } <strong class="jxr_keyword">catch</strong> (Exception e) {
+<a name="278" href="#278">278</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="279" href="#279">279</a> WSSecurityException.FAILURE,
+<a name="280" href="#280">280</a> <span class="jxr_string">"noPassword"</span>,
+<a name="281" href="#281">281</a> <strong class="jxr_keyword">new</strong> Object[] {id},
+<a name="282" href="#282">282</a> e
+<a name="283" href="#283">283</a> );
+<a name="284" href="#284">284</a> }
+<a name="285" href="#285">285</a>
+<a name="286" href="#286">286</a> Element assertionElem = pwcb.getCustomToken();
+<a name="287" href="#287">287</a> <strong class="jxr_keyword">if</strong> (assertionElem != <strong class="jxr_keyword">null</strong>) {
+<a name="288" href="#288">288</a> sa = (Element)doc.importNode(assertionElem, <strong class="jxr_keyword">true</strong>);
+<a name="289" href="#289">289</a> }
+<a name="290" href="#290">290</a> <strong class="jxr_keyword">else</strong> {
+<a name="291" href="#291">291</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="292" href="#292">292</a> WSSecurityException.INVALID_SECURITY,
+<a name="293" href="#293">293</a> <span class="jxr_string">"badReferenceURI"</span>,
+<a name="294" href="#294">294</a> <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"uri:"</span> + value + <span class="jxr_string">", saID: "</span> + saID}
+<a name="295" href="#295">295</a> );
+<a name="296" href="#296">296</a> }
+<a name="297" href="#297">297</a> } <strong class="jxr_keyword">else</strong> {
+<a name="298" href="#298">298</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="299" href="#299">299</a> WSSecurityException.INVALID_SECURITY,
+<a name="300" href="#300">300</a> <span class="jxr_string">"badReferenceURI"</span>,
+<a name="301" href="#301">301</a> <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"uri:"</span> + value + <span class="jxr_string">", saID: "</span> + saID}
+<a name="302" href="#302">302</a> );
+<a name="303" href="#303">303</a> }
+<a name="304" href="#304">304</a> }
+<a name="305" href="#305">305</a> tokElement = sa;
+<a name="306" href="#306">306</a> } <strong class="jxr_keyword">else</strong> {
+<a name="307" href="#307">307</a> tokElement = WSSecurityUtil.getElementByWsuId(doc, value);
+<a name="308" href="#308">308</a>
+<a name="309" href="#309">309</a> <em class="jxr_comment">// In some scenarios id is used rather than wsu:Id</em>
+<a name="310" href="#310">310</a> <strong class="jxr_keyword">if</strong> (tokElement == <strong class="jxr_keyword">null</strong>) {
+<a name="311" href="#311">311</a> tokElement = WSSecurityUtil.getElementByGenId(doc, value);
+<a name="312" href="#312">312</a> }
+<a name="313" href="#313">313</a> }
+<a name="314" href="#314">314</a> <strong class="jxr_keyword">if</strong> (tokElement == <strong class="jxr_keyword">null</strong>) {
+<a name="315" href="#315">315</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="316" href="#316">316</a> WSSecurityException.SECURITY_TOKEN_UNAVAILABLE,
+<a name="317" href="#317">317</a> <span class="jxr_string">"noToken"</span>,
+<a name="318" href="#318">318</a> <strong class="jxr_keyword">new</strong> Object[]{value}
+<a name="319" href="#319">319</a> );
+<a name="320" href="#320">320</a> }
+<a name="321" href="#321">321</a> <strong class="jxr_keyword">return</strong> tokElement;
+<a name="322" href="#322">322</a> }
+<a name="323" href="#323">323</a>
+<a name="324" href="#324">324</a>
+<a name="325" href="#325">325</a> <em class="jxr_javadoccomment">/**</em>
+<a name="326" href="#326">326</a> <em class="jxr_javadoccomment"> * Sets the KeyIdentifier Element as a X509 certificate.</em>
+<a name="327" href="#327">327</a> <em class="jxr_javadoccomment"> * Takes a X509 certificate, converts its data into base 64 and inserts</em>
+<a name="328" href="#328">328</a> <em class="jxr_javadoccomment"> * it into a <code>wsse:KeyIdentifier</code> element, which is placed</em>
+<a name="329" href="#329">329</a> <em class="jxr_javadoccomment"> * in the <code>wsse:SecurityTokenReference</code> element.</em>
+<a name="330" href="#330">330</a> <em class="jxr_javadoccomment"> *</em>
+<a name="331" href="#331">331</a> <em class="jxr_javadoccomment"> * @param cert is the X509 certificate to be inserted as key identifier</em>
+<a name="332" href="#332">332</a> <em class="jxr_javadoccomment"> */</em>
+<a name="333" href="#333">333</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyIdentifier(X509Certificate cert)
+<a name="334" href="#334">334</a> <strong class="jxr_keyword">throws</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="335" href="#335">335</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
+<a name="336" href="#336">336</a> byte data[] = <strong class="jxr_keyword">null</strong>;
+<a name="337" href="#337">337</a> <strong class="jxr_keyword">try</strong> {
+<a name="338" href="#338">338</a> data = cert.getEncoded();
+<a name="339" href="#339">339</a> } <strong class="jxr_keyword">catch</strong> (CertificateEncodingException e) {
+<a name="340" href="#340">340</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="341" href="#341">341</a> WSSecurityException.SECURITY_TOKEN_UNAVAILABLE, <span class="jxr_string">"encodeError"</span>, <strong class="jxr_keyword">null</strong>, e
+<a name="342" href="#342">342</a> );
+<a name="343" href="#343">343</a> }
+<a name="344" href="#344">344</a> Text text = doc.createTextNode(Base64.encode(data));
+<a name="345" href="#345">345</a>
+<a name="346" href="#346">346</a> createKeyIdentifier(doc, X509Security.X509_V3_TYPE, text, <strong class="jxr_keyword">true</strong>);
+<a name="347" href="#347">347</a> }
+<a name="348" href="#348">348</a>
+<a name="349" href="#349">349</a> <em class="jxr_javadoccomment">/**</em>
+<a name="350" href="#350">350</a> <em class="jxr_javadoccomment"> * Sets the KeyIdentifier Element as a X509 Subject-Key-Identifier (SKI).</em>
+<a name="351" href="#351">351</a> <em class="jxr_javadoccomment"> * Takes a X509 certificate, gets it SKI data, converts into base 64 and</em>
+<a name="352" href="#352">352</a> <em class="jxr_javadoccomment"> * inserts it into a <code>wsse:KeyIdentifier</code> element, which is placed</em>
+<a name="353" href="#353">353</a> <em class="jxr_javadoccomment"> * in the <code>wsse:SecurityTokenReference</code> element.</em>
+<a name="354" href="#354">354</a> <em class="jxr_javadoccomment"> *</em>
+<a name="355" href="#355">355</a> <em class="jxr_javadoccomment"> * @param cert is the X509 certificate to get the SKI</em>
+<a name="356" href="#356">356</a> <em class="jxr_javadoccomment"> * @param crypto is the Crypto implementation. Used to read SKI info bytes from certificate</em>
+<a name="357" href="#357">357</a> <em class="jxr_javadoccomment"> */</em>
+<a name="358" href="#358">358</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyIdentifierSKI(X509Certificate cert, <a href="../../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto)
+<a name="359" href="#359">359</a> <strong class="jxr_keyword">throws</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="360" href="#360">360</a> <em class="jxr_comment">//</em>
+<a name="361" href="#361">361</a> <em class="jxr_comment">// As per the 1.1 specification, SKI can only be used for a V3 certificate</em>
+<a name="362" href="#362">362</a> <em class="jxr_comment">//</em>
+<a name="363" href="#363">363</a> <strong class="jxr_keyword">if</strong> (cert.getVersion() != 3) {
+<a name="364" href="#364">364</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="365" href="#365">365</a> WSSecurityException.UNSUPPORTED_SECURITY_TOKEN,
+<a name="366" href="#366">366</a> <span class="jxr_string">"invalidCertForSKI"</span>,
+<a name="367" href="#367">367</a> <strong class="jxr_keyword">new</strong> Object[]{<strong class="jxr_keyword">new</strong> Integer(cert.getVersion())}
+<a name="368" href="#368">368</a> );
+<a name="369" href="#369">369</a> }
+<a name="370" href="#370">370</a>
+<a name="371" href="#371">371</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
+<a name="372" href="#372">372</a> byte data[] = crypto.getSKIBytesFromCert(cert);
+<a name="373" href="#373">373</a>
+<a name="374" href="#374">374</a> org.w3c.dom.Text text = doc.createTextNode(Base64.encode(data));
+<a name="375" href="#375">375</a> createKeyIdentifier(doc, SKI_URI, text, <strong class="jxr_keyword">true</strong>);
+<a name="376" href="#376">376</a> }
+<a name="377" href="#377">377</a>
+<a name="378" href="#378">378</a> <em class="jxr_javadoccomment">/**</em>
+<a name="379" href="#379">379</a> <em class="jxr_javadoccomment"> * Sets the KeyIdentifier Element as a Thumbprint.</em>
+<a name="380" href="#380">380</a> <em class="jxr_javadoccomment"> * </em>
+<a name="381" href="#381">381</a> <em class="jxr_javadoccomment"> * Takes a X509 certificate, computes its thumbprint using SHA-1, converts</em>
+<a name="382" href="#382">382</a> <em class="jxr_javadoccomment"> * into base 64 and inserts it into a <code>wsse:KeyIdentifier</code></em>
+<a name="383" href="#383">383</a> <em class="jxr_javadoccomment"> * element, which is placed in the <code>wsse:SecurityTokenReference</code></em>
+<a name="384" href="#384">384</a> <em class="jxr_javadoccomment"> * element.</em>
+<a name="385" href="#385">385</a> <em class="jxr_javadoccomment"> * </em>
+<a name="386" href="#386">386</a> <em class="jxr_javadoccomment"> * @param cert is the X509 certificate to get the thumbprint</em>
+<a name="387" href="#387">387</a> <em class="jxr_javadoccomment"> */</em>
+<a name="388" href="#388">388</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyIdentifierThumb(X509Certificate cert) <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="389" href="#389">389</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
+<a name="390" href="#390">390</a> MessageDigest sha = <strong class="jxr_keyword">null</strong>;
+<a name="391" href="#391">391</a> <strong class="jxr_keyword">try</strong> {
+<a name="392" href="#392">392</a> sha = MessageDigest.getInstance(<span class="jxr_string">"SHA-1"</span>);
+<a name="393" href="#393">393</a> } <strong class="jxr_keyword">catch</strong> (NoSuchAlgorithmException e1) {
+<a name="394" href="#394">394</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="395" href="#395">395</a> WSSecurityException.FAILURE, <span class="jxr_string">"noSHA1availabe"</span>, <strong class="jxr_keyword">null</strong>, e1
+<a name="396" href="#396">396</a> );
+<a name="397" href="#397">397</a> }
+<a name="398" href="#398">398</a> sha.reset();
+<a name="399" href="#399">399</a> <strong class="jxr_keyword">try</strong> {
+<a name="400" href="#400">400</a> sha.update(cert.getEncoded());
+<a name="401" href="#401">401</a> } <strong class="jxr_keyword">catch</strong> (CertificateEncodingException e1) {
+<a name="402" href="#402">402</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="403" href="#403">403</a> WSSecurityException.SECURITY_TOKEN_UNAVAILABLE, <span class="jxr_string">"encodeError"</span>, <strong class="jxr_keyword">null</strong>, e1
+<a name="404" href="#404">404</a> );
+<a name="405" href="#405">405</a> }
+<a name="406" href="#406">406</a> byte[] data = sha.digest();
+<a name="407" href="#407">407</a>
+<a name="408" href="#408">408</a> org.w3c.dom.Text text = doc.createTextNode(Base64.encode(data));
+<a name="409" href="#409">409</a> createKeyIdentifier(doc, THUMB_URI, text, <strong class="jxr_keyword">true</strong>);
+<a name="410" href="#410">410</a> }
+<a name="411" href="#411">411</a>
+<a name="412" href="#412">412</a>
+<a name="413" href="#413">413</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyIdentifierEncKeySHA1(String value) <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="414" href="#414">414</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
+<a name="415" href="#415">415</a> org.w3c.dom.Text text = doc.createTextNode(value);
+<a name="416" href="#416">416</a> createKeyIdentifier(doc, ENC_KEY_SHA1_URI, text, <strong class="jxr_keyword">true</strong>);
+<a name="417" href="#417">417</a> }
+<a name="418" href="#418">418</a>
+<a name="419" href="#419">419</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setSAMLKeyIdentifier(String keyIdVal) <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="420" href="#420">420</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
+<a name="421" href="#421">421</a> createKeyIdentifier(doc, SAML_ID_URI, doc.createTextNode(keyIdVal), false);
<a name="422" href="#422">422</a> }
-<a name="423" href="#423">423</a>
-<a name="424" href="#424">424</a>
-<a name="425" href="#425">425</a> <strong class="jxr_keyword">public</strong> String getX509SKIAlias(<a href="../../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="426" href="#426">426</a> <strong class="jxr_keyword">if</strong> (skiBytes == <strong class="jxr_keyword">null</strong>) {
-<a name="427" href="#427">427</a> skiBytes = getSKIBytes();
-<a name="428" href="#428">428</a> <strong class="jxr_keyword">if</strong> (skiBytes == <strong class="jxr_keyword">null</strong>) {
-<a name="429" href="#429">429</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="430" href="#430">430</a> }
-<a name="431" href="#431">431</a> }
-<a name="432" href="#432">432</a> String alias = crypto.getAliasForX509Cert(skiBytes);
-<a name="433" href="#433">433</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="434" href="#434">434</a> log.info(<span class="jxr_string">"X509 SKI alias: "</span> + alias);
-<a name="435" href="#435">435</a> }
-<a name="436" href="#436">436</a> <strong class="jxr_keyword">return</strong> alias;
-<a name="437" href="#437">437</a> }
-<a name="438" href="#438">438</a>
-<a name="439" href="#439">439</a> <strong class="jxr_keyword">public</strong> byte[] getSKIBytes() {
-<a name="440" href="#440">440</a> <strong class="jxr_keyword">if</strong> (skiBytes != <strong class="jxr_keyword">null</strong>) {
-<a name="441" href="#441">441</a> <strong class="jxr_keyword">return</strong> skiBytes;
-<a name="442" href="#442">442</a> }
-<a name="443" href="#443">443</a> Node node = getFirstElement().getFirstChild();
-<a name="444" href="#444">444</a> <strong class="jxr_keyword">if</strong> (node == <strong class="jxr_keyword">null</strong>) {
-<a name="445" href="#445">445</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="446" href="#446">446</a> }
-<a name="447" href="#447">447</a> <strong class="jxr_keyword">if</strong> (node.getNodeType() == Node.TEXT_NODE) {
-<a name="448" href="#448">448</a> <strong class="jxr_keyword">try</strong> {
-<a name="449" href="#449">449</a> skiBytes = Base64.decode(((Text) node).getData());
-<a name="450" href="#450">450</a> } <strong class="jxr_keyword">catch</strong> (WSSecurityException e) {
-<a name="451" href="#451">451</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="452" href="#452">452</a> }
-<a name="453" href="#453">453</a> }
-<a name="454" href="#454">454</a> <strong class="jxr_keyword">return</strong> skiBytes;
-<a name="455" href="#455">455</a> }
-<a name="456" href="#456">456</a>
-<a name="457" href="#457">457</a>
-<a name="458" href="#458">458</a> <em class="jxr_javadoccomment">/**</em>
-<a name="459" href="#459">459</a> <em class="jxr_javadoccomment"> * Sets the X509 IssuerSerial data.</em>
-<a name="460" href="#460">460</a> <em class="jxr_javadoccomment"> *</em>
-<a name="461" href="#461">461</a> <em class="jxr_javadoccomment"> * @param ref the {@link XMLX509IssuerSerial} to put into this</em>
-<a name="462" href="#462">462</a> <em class="jxr_javadoccomment"> * SecurityTokenReference</em>
-<a name="463" href="#463">463</a> <em class="jxr_javadoccomment"> */</em>
-<a name="464" href="#464">464</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setX509IssuerSerial(X509Data ref) {
-<a name="465" href="#465">465</a> Element elem = getFirstElement();
-<a name="466" href="#466">466</a> <strong class="jxr_keyword">if</strong> (elem != <strong class="jxr_keyword">null</strong>) {
-<a name="467" href="#467">467</a> <strong class="jxr_keyword">this</strong>.element.replaceChild(ref.getElement(), elem);
-<a name="468" href="#468">468</a> } <strong class="jxr_keyword">else</strong> {
-<a name="469" href="#469">469</a> <strong class="jxr_keyword">this</strong>.element.appendChild(ref.getElement());
-<a name="470" href="#470">470</a> }
-<a name="471" href="#471">471</a> }
+<a name="423" href="#423">423</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyIdentifier(String valueType, String keyIdVal) <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="424" href="#424">424</a> Document doc = <strong class="jxr_keyword">this</strong>.element.getOwnerDocument();
+<a name="425" href="#425">425</a> createKeyIdentifier(doc, valueType, doc.createTextNode(keyIdVal), false);
+<a name="426" href="#426">426</a> }
+<a name="427" href="#427">427</a>
+<a name="428" href="#428">428</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">void</strong> createKeyIdentifier(Document doc, String uri, Node node, <strong class="jxr_keyword">boolean</strong> base64) {
+<a name="429" href="#429">429</a> Element keyId = doc.createElementNS(WSConstants.WSSE_NS, <span class="jxr_string">"wsse:KeyIdentifier"</span>);
+<a name="430" href="#430">430</a> keyId.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"ValueType"</span>, uri);
+<a name="431" href="#431">431</a> <strong class="jxr_keyword">if</strong> (base64) {
+<a name="432" href="#432">432</a> keyId.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"EncodingType"</span>, BinarySecurity.BASE64_ENCODING);
+<a name="433" href="#433">433</a> }
+<a name="434" href="#434">434</a>
+<a name="435" href="#435">435</a> keyId.appendChild(node);
+<a name="436" href="#436">436</a> Element elem = getFirstElement();
+<a name="437" href="#437">437</a> <strong class="jxr_keyword">if</strong> (elem != <strong class="jxr_keyword">null</strong>) {
+<a name="438" href="#438">438</a> <strong class="jxr_keyword">this</strong>.element.replaceChild(keyId, elem);
+<a name="439" href="#439">439</a> } <strong class="jxr_keyword">else</strong> {
+<a name="440" href="#440">440</a> <strong class="jxr_keyword">this</strong>.element.appendChild(keyId);
+<a name="441" href="#441">441</a> }
+<a name="442" href="#442">442</a> }
+<a name="443" href="#443">443</a>
+<a name="444" href="#444">444</a>
+<a name="445" href="#445">445</a> <em class="jxr_javadoccomment">/**</em>
+<a name="446" href="#446">446</a> <em class="jxr_javadoccomment"> * get the first child element.</em>
+<a name="447" href="#447">447</a> <em class="jxr_javadoccomment"> *</em>
+<a name="448" href="#448">448</a> <em class="jxr_javadoccomment"> * @return the first <code>Element</code> child node</em>
+<a name="449" href="#449">449</a> <em class="jxr_javadoccomment"> */</em>
+<a name="450" href="#450">450</a> <strong class="jxr_keyword">public</strong> Element getFirstElement() {
+<a name="451" href="#451">451</a> <strong class="jxr_keyword">for</strong> (Node currentChild = <strong class="jxr_keyword">this</strong>.element.getFirstChild();
+<a name="452" href="#452">452</a> currentChild != <strong class="jxr_keyword">null</strong>;
+<a name="453" href="#453">453</a> currentChild = currentChild.getNextSibling()
+<a name="454" href="#454">454</a> ) {
+<a name="455" href="#455">455</a> <strong class="jxr_keyword">if</strong> (currentChild instanceof Element) {
+<a name="456" href="#456">456</a> <strong class="jxr_keyword">return</strong> (Element) currentChild;
+<a name="457" href="#457">457</a> }
+<a name="458" href="#458">458</a> }
+<a name="459" href="#459">459</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="460" href="#460">460</a> }
+<a name="461" href="#461">461</a>
+<a name="462" href="#462">462</a> <em class="jxr_javadoccomment">/**</em>
+<a name="463" href="#463">463</a> <em class="jxr_javadoccomment"> * Gets the KeyIdentifier.</em>
+<a name="464" href="#464">464</a> <em class="jxr_javadoccomment"> *</em>
+<a name="465" href="#465">465</a> <em class="jxr_javadoccomment"> * @return the the X509 certificate or zero if a unknown key identifier</em>
+<a name="466" href="#466">466</a> <em class="jxr_javadoccomment"> * type was detected.</em>
+<a name="467" href="#467">467</a> <em class="jxr_javadoccomment"> */</em>
+<a name="468" href="#468">468</a> <strong class="jxr_keyword">public</strong> X509Certificate[] getKeyIdentifier(<a href="../../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="469" href="#469">469</a> Element elem = getFirstElement();
+<a name="470" href="#470">470</a> String value = elem.getAttribute(<span class="jxr_string">"ValueType"</span>);
+<a name="471" href="#471">471</a> String alias = <strong class="jxr_keyword">null</strong>;
<a name="472" href="#472">472</a>
-<a name="473" href="#473">473</a> <em class="jxr_javadoccomment">/**</em>
-<a name="474" href="#474">474</a> <em class="jxr_javadoccomment"> * Gets the certificate identified with X509 issuerSerial data.</em>
-<a name="475" href="#475">475</a> <em class="jxr_javadoccomment"> * This method first tries to get the embedded certificate.</em>
-<a name="476" href="#476">476</a> <em class="jxr_javadoccomment"> * If this fails it checks if the certificate is in the</em>
-<a name="477" href="#477">477</a> <em class="jxr_javadoccomment"> * keystore.</em>
-<a name="478" href="#478">478</a> <em class="jxr_javadoccomment"> *</em>
-<a name="479" href="#479">479</a> <em class="jxr_javadoccomment"> * @return a certificate array or null if nothing found</em>
-<a name="480" href="#480">480</a> <em class="jxr_javadoccomment"> */</em>
-<a name="481" href="#481">481</a> <strong class="jxr_keyword">public</strong> X509Certificate[] getX509IssuerSerial(<a href="../../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="482" href="#482">482</a> String alias = getX509IssuerSerialAlias(crypto);
-<a name="483" href="#483">483</a> <strong class="jxr_keyword">if</strong> (alias != <strong class="jxr_keyword">null</strong>) {
-<a name="484" href="#484">484</a> <strong class="jxr_keyword">return</strong> crypto.getCertificates(alias);
-<a name="485" href="#485">485</a> }
-<a name="486" href="#486">486</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="487" href="#487">487</a> }
-<a name="488" href="#488">488</a>
-<a name="489" href="#489">489</a> <em class="jxr_javadoccomment">/**</em>
-<a name="490" href="#490">490</a> <em class="jxr_javadoccomment"> * Gets the alias name of the certificate identified with X509 issuerSerial data.</em>
-<a name="491" href="#491">491</a> <em class="jxr_javadoccomment"> * The keystore identifies the certificate and the key with this alias name.</em>
-<a name="492" href="#492">492</a> <em class="jxr_javadoccomment"> *</em>
-<a name="493" href="#493">493</a> <em class="jxr_javadoccomment"> * @return the alias name for the certificate or null if nothing found</em>
-<a name="494" href="#494">494</a> <em class="jxr_javadoccomment"> */</em>
-<a name="495" href="#495">495</a> <strong class="jxr_keyword">public</strong> String getX509IssuerSerialAlias(<a href="../../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="496" href="#496">496</a> <strong class="jxr_keyword">if</strong> (issuerSerial == <strong class="jxr_keyword">null</strong>) {
-<a name="497" href="#497">497</a> issuerSerial = getIssuerSerial();
-<a name="498" href="#498">498</a> <strong class="jxr_keyword">if</strong> (issuerSerial == <strong class="jxr_keyword">null</strong>) {
-<a name="499" href="#499">499</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="500" href="#500">500</a> }
-<a name="501" href="#501">501</a> }
-<a name="502" href="#502">502</a>
-<a name="503" href="#503">503</a> String alias =
-<a name="504" href="#504">504</a> crypto.getAliasForX509Cert(issuerSerial.getIssuerName(), issuerSerial.getSerialNumber());
-<a name="505" href="#505">505</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="506" href="#506">506</a> log.info(<span class="jxr_string">"X509IssuerSerial alias: "</span> + alias);
-<a name="507" href="#507">507</a> }
-<a name="508" href="#508">508</a> <strong class="jxr_keyword">return</strong> alias;
-<a name="509" href="#509">509</a> }
-<a name="510" href="#510">510</a>
-<a name="511" href="#511">511</a> <strong class="jxr_keyword">private</strong> XMLX509IssuerSerial getIssuerSerial() <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="512" href="#512">512</a> <strong class="jxr_keyword">if</strong> (issuerSerial != <strong class="jxr_keyword">null</strong>) {
-<a name="513" href="#513">513</a> <strong class="jxr_keyword">return</strong> issuerSerial;
-<a name="514" href="#514">514</a> }
-<a name="515" href="#515">515</a> Element elem = getFirstElement();
-<a name="516" href="#516">516</a> <strong class="jxr_keyword">if</strong> (elem == <strong class="jxr_keyword">null</strong>) {
-<a name="517" href="#517">517</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="518" href="#518">518</a> }
-<a name="519" href="#519">519</a> <strong class="jxr_keyword">try</strong> {
-<a name="520" href="#520">520</a> <strong class="jxr_keyword">if</strong> (Constants._TAG_X509DATA.equals(elem.getLocalName())) {
-<a name="521" href="#521">521</a> elem =
-<a name="522" href="#522">522</a> (Element)WSSecurityUtil.findElement(
-<a name="523" href="#523">523</a> elem, Constants._TAG_X509ISSUERSERIAL, Constants.SignatureSpecNS
-<a name="524" href="#524">524</a> );
-<a name="525" href="#525">525</a> }
-<a name="526" href="#526">526</a> issuerSerial = <strong class="jxr_keyword">new</strong> XMLX509IssuerSerial(elem, <span class="jxr_string">""</span>);
-<a name="527" href="#527">527</a> } <strong class="jxr_keyword">catch</strong> (XMLSecurityException e) {
-<a name="528" href="#528">528</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="529" href="#529">529</a> WSSecurityException.SECURITY_TOKEN_UNAVAILABLE,
-<a name="530" href="#530">530</a> <span class="jxr_string">"noToken"</span>,
-<a name="531" href="#531">531</a> <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"Issuer/Serial data element missing"</span>},
-<a name="532" href="#532">532</a> e
-<a name="533" href="#533">533</a> );
-<a name="534" href="#534">534</a> }
-<a name="535" href="#535">535</a> <strong class="jxr_keyword">return</strong> issuerSerial;
-<a name="536" href="#536">536</a> }
-<a name="537" href="#537">537</a>
-<a name="538" href="#538">538</a> <em class="jxr_javadoccomment">/**</em>
-<a name="539" href="#539">539</a> <em class="jxr_javadoccomment"> * Method containsReference</em>
-<a name="540" href="#540">540</a> <em class="jxr_javadoccomment"> *</em>
-<a name="541" href="#541">541</a> <em class="jxr_javadoccomment"> * @return true if the <code>SecurtityTokenReference</code> contains</em>
-<a name="542" href="#542">542</a> <em class="jxr_javadoccomment"> * a <code>wsse:Reference</code> element</em>
-<a name="543" href="#543">543</a> <em class="jxr_javadoccomment"> */</em>
-<a name="544" href="#544">544</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> containsReference() {
-<a name="545" href="#545">545</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.lengthReference() > 0;
-<a name="546" href="#546">546</a> }
-<a name="547" href="#547">547</a>
-<a name="548" href="#548">548</a> <em class="jxr_javadoccomment">/**</em>
-<a name="549" href="#549">549</a> <em class="jxr_javadoccomment"> * Method lengthReference.</em>
-<a name="550" href="#550">550</a> <em class="jxr_javadoccomment"> *</em>
-<a name="551" href="#551">551</a> <em class="jxr_javadoccomment"> * @return number of <code>wsse:Reference</code> elements in</em>
-<a name="552" href="#552">552</a> <em class="jxr_javadoccomment"> * the <code>SecurtityTokenReference</code></em>
-<a name="553" href="#553">553</a> <em class="jxr_javadoccomment"> */</em>
-<a name="554" href="#554">554</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">int</strong> lengthReference() {
-<a name="555" href="#555">555</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.length(WSConstants.WSSE_NS, <span class="jxr_string">"Reference"</span>);
-<a name="556" href="#556">556</a> }
-<a name="557" href="#557">557</a>
-<a name="558" href="#558">558</a> <em class="jxr_javadoccomment">/**</em>
-<a name="559" href="#559">559</a> <em class="jxr_javadoccomment"> * Method containsX509IssuerSerial</em>
-<a name="560" href="#560">560</a> <em class="jxr_javadoccomment"> *</em>
-<a name="561" href="#561">561</a> <em class="jxr_javadoccomment"> * @return true if the <code>SecurtityTokenReference</code> contains</em>
-<a name="562" href="#562">562</a> <em class="jxr_javadoccomment"> * a <code>ds:IssuerSerial</code> element</em>
-<a name="563" href="#563">563</a> <em class="jxr_javadoccomment"> */</em>
-<a name="564" href="#564">564</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> containsX509IssuerSerial() {
-<a name="565" href="#565">565</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.lengthX509IssuerSerial() > 0;
-<a name="566" href="#566">566</a> }
-<a name="567" href="#567">567</a>
-<a name="568" href="#568">568</a> <em class="jxr_javadoccomment">/**</em>
-<a name="569" href="#569">569</a> <em class="jxr_javadoccomment"> * Method containsX509Data</em>
-<a name="570" href="#570">570</a> <em class="jxr_javadoccomment"> *</em>
-<a name="571" href="#571">571</a> <em class="jxr_javadoccomment"> * @return true if the <code>SecurtityTokenReference</code> contains</em>
-<a name="572" href="#572">572</a> <em class="jxr_javadoccomment"> * a <code>ds:X509Data</code> element</em>
-<a name="573" href="#573">573</a> <em class="jxr_javadoccomment"> */</em>
-<a name="574" href="#574">574</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> containsX509Data() {
-<a name="575" href="#575">575</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.lengthX509Data() > 0;
-<a name="576" href="#576">576</a> }
-<a name="577" href="#577">577</a>
-<a name="578" href="#578">578</a> <em class="jxr_javadoccomment">/**</em>
-<a name="579" href="#579">579</a> <em class="jxr_javadoccomment"> * Method lengthX509IssuerSerial.</em>
-<a name="580" href="#580">580</a> <em class="jxr_javadoccomment"> *</em>
-<a name="581" href="#581">581</a> <em class="jxr_javadoccomment"> * @return number of <code>ds:IssuerSerial</code> elements in</em>
-<a name="582" href="#582">582</a> <em class="jxr_javadoccomment"> * the <code>SecurtityTokenReference</code></em>
-<a name="583" href="#583">583</a> <em class="jxr_javadoccomment"> */</em>
-<a name="584" href="#584">584</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">int</strong> lengthX509IssuerSerial() {
-<a name="585" href="#585">585</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.length(WSConstants.SIG_NS, Constants._TAG_X509ISSUERSERIAL);
-<a name="586" href="#586">586</a> }
-<a name="587" href="#587">587</a>
-<a name="588" href="#588">588</a> <em class="jxr_javadoccomment">/**</em>
-<a name="589" href="#589">589</a> <em class="jxr_javadoccomment"> * Method lengthX509Data.</em>
-<a name="590" href="#590">590</a> <em class="jxr_javadoccomment"> *</em>
-<a name="591" href="#591">591</a> <em class="jxr_javadoccomment"> * @return number of <code>ds:IssuerSerial</code> elements in</em>
-<a name="592" href="#592">592</a> <em class="jxr_javadoccomment"> * the <code>SecurtityTokenReference</code></em>
-<a name="593" href="#593">593</a> <em class="jxr_javadoccomment"> */</em>
-<a name="594" href="#594">594</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">int</strong> lengthX509Data() {
-<a name="595" href="#595">595</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.length(WSConstants.SIG_NS, Constants._TAG_X509DATA);
-<a name="596" href="#596">596</a> }
-<a name="597" href="#597">597</a>
-<a name="598" href="#598">598</a> <em class="jxr_javadoccomment">/**</em>
-<a name="599" href="#599">599</a> <em class="jxr_javadoccomment"> * Method containsKeyIdentifier.</em>
-<a name="600" href="#600">600</a> <em class="jxr_javadoccomment"> *</em>
-<a name="601" href="#601">601</a> <em class="jxr_javadoccomment"> * @return true if the <code>SecurtityTokenReference</code> contains</em>
-<a name="602" href="#602">602</a> <em class="jxr_javadoccomment"> * a <code>wsse:KeyIdentifier</code> element</em>
-<a name="603" href="#603">603</a> <em class="jxr_javadoccomment"> */</em>
-<a name="604" href="#604">604</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> containsKeyIdentifier() {
-<a name="605" href="#605">605</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.lengthKeyIdentifier() > 0;
+<a name="473" href="#473">473</a> <strong class="jxr_keyword">if</strong> (X509Security.X509_V3_TYPE.equals(value)) {
+<a name="474" href="#474">474</a> X509Security token = <strong class="jxr_keyword">new</strong> X509Security(elem);
+<a name="475" href="#475">475</a> <strong class="jxr_keyword">if</strong> (token != <strong class="jxr_keyword">null</strong>) {
+<a name="476" href="#476">476</a> X509Certificate cert = token.getX509Certificate(crypto);
+<a name="477" href="#477">477</a> X509Certificate[] certs = <strong class="jxr_keyword">new</strong> X509Certificate[1];
+<a name="478" href="#478">478</a> certs[0] = cert;
+<a name="479" href="#479">479</a> <strong class="jxr_keyword">return</strong> certs;
+<a name="480" href="#480">480</a> }
+<a name="481" href="#481">481</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (SKI_URI.equals(value)) {
+<a name="482" href="#482">482</a> alias = getX509SKIAlias(crypto);
+<a name="483" href="#483">483</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (THUMB_URI.equals(value)) {
+<a name="484" href="#484">484</a> Node node = getFirstElement().getFirstChild();
+<a name="485" href="#485">485</a> <strong class="jxr_keyword">if</strong> (node == <strong class="jxr_keyword">null</strong>) {
+<a name="486" href="#486">486</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="487" href="#487">487</a> }
+<a name="488" href="#488">488</a> <strong class="jxr_keyword">if</strong> (node.getNodeType() == Node.TEXT_NODE) {
+<a name="489" href="#489">489</a> byte[] thumb = Base64.decode(((Text) node).getData());
+<a name="490" href="#490">490</a> alias = crypto.getAliasForX509CertThumb(thumb);
+<a name="491" href="#491">491</a> }
+<a name="492" href="#492">492</a> }
+<a name="493" href="#493">493</a>
+<a name="494" href="#494">494</a> <strong class="jxr_keyword">if</strong> (alias != <strong class="jxr_keyword">null</strong>) {
+<a name="495" href="#495">495</a> <strong class="jxr_keyword">return</strong> crypto.getCertificates(alias);
+<a name="496" href="#496">496</a> }
+<a name="497" href="#497">497</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="498" href="#498">498</a> }
+<a name="499" href="#499">499</a>
+<a name="500" href="#500">500</a> <strong class="jxr_keyword">public</strong> String getKeyIdentifierValue() {
+<a name="501" href="#501">501</a> <strong class="jxr_keyword">if</strong> (containsKeyIdentifier()) {
+<a name="502" href="#502">502</a> Node node = getFirstElement().getFirstChild();
+<a name="503" href="#503">503</a> <strong class="jxr_keyword">if</strong> (node == <strong class="jxr_keyword">null</strong>) {
+<a name="504" href="#504">504</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="505" href="#505">505</a> }
+<a name="506" href="#506">506</a> <strong class="jxr_keyword">if</strong> (node.getNodeType() == Node.TEXT_NODE) {
+<a name="507" href="#507">507</a> <strong class="jxr_keyword">return</strong> ((Text) node).getData();
+<a name="508" href="#508">508</a> }
+<a name="509" href="#509">509</a> }
+<a name="510" href="#510">510</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="511" href="#511">511</a> }
+<a name="512" href="#512">512</a>
+<a name="513" href="#513">513</a> <strong class="jxr_keyword">public</strong> String getKeyIdentifierValueType() {
+<a name="514" href="#514">514</a> <strong class="jxr_keyword">if</strong> (containsKeyIdentifier()) {
+<a name="515" href="#515">515</a> Element elem = getFirstElement();
+<a name="516" href="#516">516</a> <strong class="jxr_keyword">return</strong> elem.getAttribute(<span class="jxr_string">"ValueType"</span>);
+<a name="517" href="#517">517</a> }
+<a name="518" href="#518">518</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="519" href="#519">519</a> }
+<a name="520" href="#520">520</a>
+<a name="521" href="#521">521</a>
+<a name="522" href="#522">522</a> <strong class="jxr_keyword">public</strong> String getX509SKIAlias(<a href="../../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="523" href="#523">523</a> <strong class="jxr_keyword">if</strong> (skiBytes == <strong class="jxr_keyword">null</strong>) {
+<a name="524" href="#524">524</a> skiBytes = getSKIBytes();
+<a name="525" href="#525">525</a> <strong class="jxr_keyword">if</strong> (skiBytes == <strong class="jxr_keyword">null</strong>) {
+<a name="526" href="#526">526</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="527" href="#527">527</a> }
+<a name="528" href="#528">528</a> }
+<a name="529" href="#529">529</a> String alias = crypto.getAliasForX509Cert(skiBytes);
+<a name="530" href="#530">530</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="531" href="#531">531</a> log.info(<span class="jxr_string">"X509 SKI alias: "</span> + alias);
+<a name="532" href="#532">532</a> }
+<a name="533" href="#533">533</a> <strong class="jxr_keyword">return</strong> alias;
+<a name="534" href="#534">534</a> }
+<a name="535" href="#535">535</a>
+<a name="536" href="#536">536</a> <strong class="jxr_keyword">public</strong> byte[] getSKIBytes() {
+<a name="537" href="#537">537</a> <strong class="jxr_keyword">if</strong> (skiBytes != <strong class="jxr_keyword">null</strong>) {
+<a name="538" href="#538">538</a> <strong class="jxr_keyword">return</strong> skiBytes;
+<a name="539" href="#539">539</a> }
+<a name="540" href="#540">540</a> Node node = getFirstElement().getFirstChild();
+<a name="541" href="#541">541</a> <strong class="jxr_keyword">if</strong> (node == <strong class="jxr_keyword">null</strong>) {
+<a name="542" href="#542">542</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="543" href="#543">543</a> }
+<a name="544" href="#544">544</a> <strong class="jxr_keyword">if</strong> (node.getNodeType() == Node.TEXT_NODE) {
+<a name="545" href="#545">545</a> <strong class="jxr_keyword">try</strong> {
+<a name="546" href="#546">546</a> skiBytes = Base64.decode(((Text) node).getData());
+<a name="547" href="#547">547</a> } <strong class="jxr_keyword">catch</strong> (WSSecurityException e) {
+<a name="548" href="#548">548</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="549" href="#549">549</a> }
+<a name="550" href="#550">550</a> }
+<a name="551" href="#551">551</a> <strong class="jxr_keyword">return</strong> skiBytes;
+<a name="552" href="#552">552</a> }
+<a name="553" href="#553">553</a>
+<a name="554" href="#554">554</a>
+<a name="555" href="#555">555</a> <em class="jxr_javadoccomment">/**</em>
+<a name="556" href="#556">556</a> <em class="jxr_javadoccomment"> * Sets the X509 IssuerSerial data.</em>
+<a name="557" href="#557">557</a> <em class="jxr_javadoccomment"> *</em>
+<a name="558" href="#558">558</a> <em class="jxr_javadoccomment"> * @param ref the {@link XMLX509IssuerSerial} to put into this</em>
+<a name="559" href="#559">559</a> <em class="jxr_javadoccomment"> * SecurityTokenReference</em>
+<a name="560" href="#560">560</a> <em class="jxr_javadoccomment"> */</em>
+<a name="561" href="#561">561</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setX509IssuerSerial(X509Data ref) {
+<a name="562" href="#562">562</a> Element elem = getFirstElement();
+<a name="563" href="#563">563</a> <strong class="jxr_keyword">if</strong> (elem != <strong class="jxr_keyword">null</strong>) {
[... 277 lines stripped ...]
---------------------------------------------------------------------
To unsubscribe, e-mail: wss4j-dev-unsubscribe@ws.apache.org
For additional commands, e-mail: wss4j-dev-help@ws.apache.org