You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ws.apache.org by di...@apache.org on 2005/03/09 16:31:13 UTC
cvs commit: ws-site/targets/ws-fx/wss4j/docs/xref/org/apache/ws/security/transform package-frame.html package-summary.html STRTransform.html
dims 2005/03/09 07:31:13
Added: targets/ws-fx/wss4j/docs/xref/org/apache/ws/security/transform
package-frame.html package-summary.html
STRTransform.html
Log:
Update WSS4J web site.
Revision Changes Path
1.1 ws-site/targets/ws-fx/wss4j/docs/xref/org/apache/ws/security/transform/package-frame.html
Index: package-frame.html
===================================================================
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "DTD/xhtml1-transitional.dtd">
<html lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1"></meta>
<title>Apache WSS4J 1.0 Reference Package org.apache.ws.security.transform</title>
<link rel="stylesheet" href="../../../../../stylesheet.css" type="text/css" title="style"></link>
</head>
<body>
<h3>
<a href="package-summary.html" target="classFrame">org.apache.ws.security.transform</a>
</h3>
<h3>Classes</h3>
<ul>
<li>
<a href="STRTransform.html" target="classFrame">STRTransform</a>
</li>
</ul>
</body>
</html>
1.1 ws-site/targets/ws-fx/wss4j/docs/xref/org/apache/ws/security/transform/package-summary.html
Index: package-summary.html
===================================================================
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "DTD/xhtml1-transitional.dtd">
<html lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1"></meta>
<title>Apache WSS4J 1.0 Reference Package </title>
<link rel="stylesheet" href="../../../../../stylesheet.css" type="text/css" title="style"></link>
</head>
<body>
<div class="overview">
<ul>
<li>
<a href="../../../../../overview-summary.html">Overview</a>
</li>
<li class="selected">Package</li>
</ul>
</div>
<div class="framenoframe">
<ul>
<li>
<a href="../../../../../index.html" target="_top">FRAMES</a>
</li>
<li>
<a href="package-summary.html" target="_top">NO FRAMES</a>
</li>
</ul>
</div>
<h2>Package org.apache.ws.security.transform</h2>
<table class="summary">
<thead>
<tr>
<th>Class Summary</th>
</tr>
</thead>
<tbody>
<tr>
<td>
<a href="STRTransform.html" target="classFrame">STRTransform</a>
</td>
</tr>
</tbody>
</table>
<div class="overview">
<ul>
<li>
<a href="../../../../../overview-summary.html">Overview</a>
</li>
<li class="selected">Package</li>
</ul>
</div>
<div class="framenoframe">
<ul>
<li>
<a href="../../../../../index.html" target="_top">FRAMES</a>
</li>
<li>
<a href="package-summary.html" target="_top">NO FRAMES</a>
</li>
</ul>
</div>
<hr></hr>
Copyright © Apache Web Services. All Rights Reserved.
</body>
</html>
1.1 ws-site/targets/ws-fx/wss4j/docs/xref/org/apache/ws/security/transform/STRTransform.html
Index: STRTransform.html
===================================================================
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" /><title>STRTransform xref</title>
<link type="text/css" rel="stylesheet" href="../../../../../stylesheet.css" />
</head>
<body>
<div id="overview"><a href="../../../../../../apidocs/org/apache/ws/security/transform/STRTransform.html">View Javadoc</a></div><pre>
<a name="1" href="#1">1</a> <em class="comment">/*</em>
<a name="2" href="#2">2</a> <em class="comment"> * Copyright 2003-2004 The Apache Software Foundation.</em>
<a name="3" href="#3">3</a> <em class="comment"> *</em>
<a name="4" href="#4">4</a> <em class="comment"> * Licensed under the Apache License, Version 2.0 (the "License");</em>
<a name="5" href="#5">5</a> <em class="comment"> * you may not use this file except in compliance with the License.</em>
<a name="6" href="#6">6</a> <em class="comment"> * You may obtain a copy of the License at</em>
<a name="7" href="#7">7</a> <em class="comment"> *</em>
<a name="8" href="#8">8</a> <em class="comment"> * <a href="http://www.apache.org/licenses/LICENSE-2.0" target="alexandria_uri">http://www.apache.org/licenses/LICENSE-2.0</a></em>
<a name="9" href="#9">9</a> <em class="comment"> *</em>
<a name="10" href="#10">10</a> <em class="comment"> * Unless required by applicable law or agreed to in writing, software</em>
<a name="11" href="#11">11</a> <em class="comment"> * distributed under the License is distributed on an "AS IS" BASIS,</em>
<a name="12" href="#12">12</a> <em class="comment"> * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.</em>
<a name="13" href="#13">13</a> <em class="comment"> * See the License for the specific language governing permissions and</em>
<a name="14" href="#14">14</a> <em class="comment"> * limitations under the License.</em>
<a name="15" href="#15">15</a> <em class="comment"> *</em>
<a name="16" href="#16">16</a> <em class="comment"> */</em>
<a name="17" href="#17">17</a>
<a name="18" href="#18">18</a> <strong>package</strong> <a href="../../../../../org/apache/ws/security/transform/package-summary.html">org.apache.ws.security.transform</a>;
<a name="19" href="#19">19</a>
<a name="20" href="#20">20</a> <strong>import</strong> org.apache.commons.logging.Log;
<a name="21" href="#21">21</a> <strong>import</strong> org.apache.commons.logging.LogFactory;
<a name="22" href="#22">22</a> <strong>import</strong> org.apache.ws.security.WSConstants;
<a name="23" href="#23">23</a> <strong>import</strong> org.apache.ws.security.WSDocInfo;
<a name="24" href="#24">24</a> <strong>import</strong> org.apache.ws.security.WSDocInfoStore;
<a name="25" href="#25">25</a> <strong>import</strong> org.apache.ws.security.WSSConfig;
<a name="26" href="#26">26</a> <strong>import</strong> org.apache.ws.security.message.token.SecurityTokenReference;
<a name="27" href="#27">27</a> <strong>import</strong> org.apache.ws.security.message.token.X509Security;
<a name="28" href="#28">28</a> <strong>import</strong> org.apache.ws.security.util.WSSecurityUtil;
<a name="29" href="#29">29</a> <strong>import</strong> org.apache.xml.security.c14n.CanonicalizationException;
<a name="30" href="#30">30</a> <strong>import</strong> org.apache.xml.security.c14n.Canonicalizer;
<a name="31" href="#31">31</a> <strong>import</strong> org.apache.xml.security.c14n.InvalidCanonicalizerException;
<a name="32" href="#32">32</a> <strong>import</strong> org.apache.xml.security.exceptions.XMLSecurityException;
<a name="33" href="#33">33</a> <strong>import</strong> org.apache.xml.security.signature.XMLSignatureInput;
<a name="34" href="#34">34</a> <strong>import</strong> org.apache.xml.security.transforms.TransformSpi;
<a name="35" href="#35">35</a> <strong>import</strong> org.apache.xml.security.utils.Base64;
<a name="36" href="#36">36</a> <strong>import</strong> org.apache.xml.security.utils.XMLUtils;
<a name="37" href="#37">37</a> <strong>import</strong> org.w3c.dom.Document;
<a name="38" href="#38">38</a> <strong>import</strong> org.w3c.dom.Element;
<a name="39" href="#39">39</a> <strong>import</strong> org.w3c.dom.Node;
<a name="40" href="#40">40</a> <strong>import</strong> org.w3c.dom.NodeList;
<a name="41" href="#41">41</a> <strong>import</strong> org.w3c.dom.Text;
<a name="42" href="#42">42</a> <strong>import</strong> org.xml.sax.SAXException;
<a name="43" href="#43">43</a>
<a name="44" href="#44">44</a> <strong>import</strong> javax.xml.parsers.DocumentBuilder;
<a name="45" href="#45">45</a> <strong>import</strong> javax.xml.parsers.DocumentBuilderFactory;
<a name="46" href="#46">46</a> <strong>import</strong> javax.xml.parsers.ParserConfigurationException;
<a name="47" href="#47">47</a> <strong>import</strong> javax.xml.transform.TransformerException;
<a name="48" href="#48">48</a> <strong>import</strong> java.io.ByteArrayInputStream;
<a name="49" href="#49">49</a> <strong>import</strong> java.io.ByteArrayOutputStream;
<a name="50" href="#50">50</a> <strong>import</strong> java.io.IOException;
<a name="51" href="#51">51</a> <strong>import</strong> java.security.cert.X509Certificate;
<a name="52" href="#52">52</a>
<a name="53" href="#53">53</a> <em>/**<em>*</em></em>
<a name="54" href="#54">54</a> <em> * Class STRTransform</em>
<a name="55" href="#55">55</a> <em> *</em>
<a name="56" href="#56">56</a> <em> * @author Werner Dittmann (Werner.Dittmann@siemens.com)</em>
<a name="57" href="#57">57</a> <em> * @version 1.0</em>
<a name="58" href="#58">58</a> <em> */</em>
<a name="59" href="#59">59</a> <strong>public</strong> <strong>class</strong> <a href="../../../../../org/apache/ws/security/transform/STRTransform.html">STRTransform</a> <strong>extends</strong> TransformSpi {
<a name="60" href="#60">60</a>
<a name="61" href="#61">61</a> <em>/**<em>*</em></em>
<a name="62" href="#62">62</a> <em> * Field implementedTransformURI</em>
<a name="63" href="#63">63</a> <em> */</em>
<a name="64" href="#64">64</a> <strong>public</strong> <strong>static</strong> <strong>final</strong> String implementedTransformURI =
<a name="65" href="#65">65</a> <span class="string">"http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#STR-Transform"</span>;
<a name="66" href="#66">66</a>
<a name="67" href="#67">67</a> <strong>private</strong> <strong>static</strong> Log log = LogFactory.getLog(STRTransform.<strong>class</strong>.getName());
<a name="68" href="#68">68</a> <strong>private</strong> <strong>static</strong> <strong>boolean</strong> doDebug = false;
<a name="69" href="#69">69</a>
<a name="70" href="#70">70</a> <strong>private</strong> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo = <strong>null</strong>;
<a name="71" href="#71">71</a>
<a name="72" href="#72">72</a> <strong>public</strong> <strong>boolean</strong> wantsOctetStream() {
<a name="73" href="#73">73</a> <strong>return</strong> false;
<a name="74" href="#74">74</a> }
<a name="75" href="#75">75</a>
<a name="76" href="#76">76</a> <strong>public</strong> <strong>boolean</strong> wantsNodeSet() {
<a name="77" href="#77">77</a> <strong>return</strong> <strong>true</strong>;
<a name="78" href="#78">78</a> }
<a name="79" href="#79">79</a>
<a name="80" href="#80">80</a> <strong>public</strong> <strong>boolean</strong> returnsOctetStream() {
<a name="81" href="#81">81</a> <strong>return</strong> <strong>true</strong>;
<a name="82" href="#82">82</a> }
<a name="83" href="#83">83</a>
<a name="84" href="#84">84</a> <strong>public</strong> <strong>boolean</strong> returnsNodeSet() {
<a name="85" href="#85">85</a> <strong>return</strong> false;
<a name="86" href="#86">86</a> }
<a name="87" href="#87">87</a>
<a name="88" href="#88">88</a> <em>/**<em>*</em></em>
<a name="89" href="#89">89</a> <em> * Method engineGetURI</em>
<a name="90" href="#90">90</a> <em> */</em>
<a name="91" href="#91">91</a> <strong>protected</strong> String engineGetURI() {
<a name="92" href="#92">92</a> <strong>return</strong> STRTransform.implementedTransformURI;
<a name="93" href="#93">93</a> }
<a name="94" href="#94">94</a>
<a name="95" href="#95">95</a> <em>/**<em>*</em></em>
<a name="96" href="#96">96</a> <em> * Method enginePerformTransform</em>
<a name="97" href="#97">97</a> <em> *</em>
<a name="98" href="#98">98</a> <em> * @param input</em>
<a name="99" href="#99">99</a> <em> * @throws CanonicalizationException</em>
<a name="100" href="#100">100</a> <em> * @throws InvalidCanonicalizerException</em>
<a name="101" href="#101">101</a> <em> */</em>
<a name="102" href="#102">102</a> <strong>protected</strong> XMLSignatureInput enginePerformTransform(XMLSignatureInput input)
<a name="103" href="#103">103</a> throws IOException,
<a name="104" href="#104">104</a> CanonicalizationException,
<a name="105" href="#105">105</a> InvalidCanonicalizerException {
<a name="106" href="#106">106</a>
<a name="107" href="#107">107</a> doDebug = log.isDebugEnabled();
<a name="108" href="#108">108</a>
<a name="109" href="#109">109</a> <strong>if</strong> (doDebug) {
<a name="110" href="#110">110</a> log.debug(<span class="string">"Beginning STRTransform..."</span> + input.toString());
<a name="111" href="#111">111</a> }
<a name="112" href="#112">112</a>
<a name="113" href="#113">113</a> <strong>try</strong> {
<a name="114" href="#114">114</a>
<a name="115" href="#115">115</a> <em class="comment">/*</em>
<a name="116" href="#116">116</a> <em class="comment"> * Get the main document, that is the complete SOAP</em>
<a name="117" href="#117">117</a> <em class="comment"> * request document</em>
<a name="118" href="#118">118</a> <em class="comment"> */</em>
<a name="119" href="#119">119</a> Document <strong>this</strong>Doc = <strong>this</strong>._transformObject.getDocument();
<a name="120" href="#120">120</a> <strong>int</strong> docHash = thisDoc.hashCode();
<a name="121" href="#121">121</a> <strong>if</strong> (doDebug) {
<a name="122" href="#122">122</a> log.debug(<span class="string">"doc: "</span> + thisDoc.toString() + <span class="string">", "</span> + docHash);
<a name="123" href="#123">123</a> }
<a name="124" href="#124">124</a>
<a name="125" href="#125">125</a> <em class="comment">/*</em>
<a name="126" href="#126">126</a> <em class="comment"> * Here we get some information about the document that is being</em>
<a name="127" href="#127">127</a> <em class="comment"> * processed, in partucular the crypto implementation, and already</em>
<a name="128" href="#128">128</a> <em class="comment"> * detected BST that may be used later during dereferencing.</em>
<a name="129" href="#129">129</a> <em class="comment"> */</em>
<a name="130" href="#130">130</a> wsDocInfo = WSDocInfoStore.lookup(docHash);
<a name="131" href="#131">131</a> <strong>if</strong> (wsDocInfo == <strong>null</strong>) {
<a name="132" href="#132">132</a> <strong>throw</strong> (<strong>new</strong> CanonicalizationException(<span class="string">"no WSDocInfo found"</span>));
<a name="133" href="#133">133</a> }
<a name="134" href="#134">134</a>
<a name="135" href="#135">135</a> <em class="comment">/*</em>
<a name="136" href="#136">136</a> <em class="comment"> * According to the OASIS WS Specification</em>
<a name="137" href="#137">137</a> <em class="comment"> * "Web Services Security: SOAP Message Security 1.0"</em>
<a name="138" href="#138">138</a> <em class="comment"> * Monday, 19 January 2004, chapter 8.3 describes that</em>
<a name="139" href="#139">139</a> <em class="comment"> * the input node set must be processed bythe c14n that</em>
<a name="140" href="#140">140</a> <em class="comment"> * is specified in the argument element of the STRTransform</em>
<a name="141" href="#141">141</a> <em class="comment"> * element.</em>
<a name="142" href="#142">142</a> <em class="comment"> *</em>
<a name="143" href="#143">143</a> <em class="comment"> * First step: Get the required c14n argument. After that, get</em>
<a name="144" href="#144">144</a> <em class="comment"> * the c14n, feed the node set into c14n and get back the byte[].</em>
<a name="145" href="#145">145</a> <em class="comment"> * The byte[] contains the XML doc part to be</em>
<a name="146" href="#146">146</a> <em class="comment"> * signed or verified. Then reparse the byte[] to get the DOM.</em>
<a name="147" href="#147">147</a> <em class="comment"> */</em>
<a name="148" href="#148">148</a>
<a name="149" href="#149">149</a> String canonAlgo = <strong>null</strong>;
<a name="150" href="#150">150</a> <strong>if</strong> (<strong>this</strong>._transformObject.length(WSConstants.WSSE_NS,
<a name="151" href="#151">151</a> <span class="string">"TransformationParameters"</span>) == 1) {
<a name="152" href="#152">152</a> Element tmpE = XMLUtils.selectNode(
<a name="153" href="#153">153</a> <strong>this</strong>._transformObject.getElement().getFirstChild(),
<a name="154" href="#154">154</a> WSConstants.WSSE_NS, <span class="string">"TransformationParameters"</span>, 0);
<a name="155" href="#155">155</a> Element canonElem = (Element) WSSecurityUtil.getDirectChild(
<a name="156" href="#156">156</a> tmpE, <span class="string">"CanonicalizationMethod"</span>, WSConstants.SIG_NS);
<a name="157" href="#157">157</a> canonAlgo = canonElem.getAttribute(<span class="string">"Algorithm"</span>);
<a name="158" href="#158">158</a> <strong>if</strong> (doDebug) {
<a name="159" href="#159">159</a> log.debug(<span class="string">"CanonAlgo: "</span> + canonAlgo);
<a name="160" href="#160">160</a> }
<a name="161" href="#161">161</a> }
<a name="162" href="#162">162</a> Canonicalizer canon = Canonicalizer.getInstance(canonAlgo);
<a name="163" href="#163">163</a> byte buf[] = canon.canonicalizeXPathNodeSet(input.getNodeSet());
<a name="164" href="#164">164</a>
<a name="165" href="#165">165</a> ByteArrayOutputStream bos = <strong>new</strong> ByteArrayOutputStream(buf.length);
<a name="166" href="#166">166</a> bos.write(buf, 0, buf.length);
<a name="167" href="#167">167</a>
<a name="168" href="#168">168</a> <strong>if</strong> (doDebug) {
<a name="169" href="#169">169</a> log.debug(<span class="string">"canon bos: "</span> + bos.toString());
<a name="170" href="#170">170</a> }
<a name="171" href="#171">171</a>
<a name="172" href="#172">172</a> DocumentBuilderFactory dfactory = DocumentBuilderFactory
<a name="173" href="#173">173</a> .newInstance();
<a name="174" href="#174">174</a> dfactory.setValidating(false);
<a name="175" href="#175">175</a> dfactory.setNamespaceAware(<strong>true</strong>);
<a name="176" href="#176">176</a>
<a name="177" href="#177">177</a> DocumentBuilder db = dfactory.newDocumentBuilder();
<a name="178" href="#178">178</a>
<a name="179" href="#179">179</a> Document doc = db
<a name="180" href="#180">180</a> .parse(<strong>new</strong> ByteArrayInputStream(bos.toByteArray()));
<a name="181" href="#181">181</a>
<a name="182" href="#182">182</a> <em class="comment">/*</em>
<a name="183" href="#183">183</a> <em class="comment"> * Second step: find the STR element inside the resulting XML doc,</em>
<a name="184" href="#184">184</a> <em class="comment"> * check if STR contains some reference to an security token.</em>
<a name="185" href="#185">185</a> <em class="comment"> */</em>
<a name="186" href="#186">186</a>
<a name="187" href="#187">187</a> NodeList nodeList =
<a name="188" href="#188">188</a> doc.getElementsByTagNameNS(WSConstants.WSSE_NS,
<a name="189" href="#189">189</a> <span class="string">"SecurityTokenReference"</span>);
<a name="190" href="#190">190</a>
<a name="191" href="#191">191</a> Element str = <strong>null</strong>;
<a name="192" href="#192">192</a> Element tmpEl = (Element) nodeList.item(0);
<a name="193" href="#193">193</a> <strong>if</strong> (doDebug) {
<a name="194" href="#194">194</a> log.debug(<span class="string">"STR: "</span> + tmpEl.toString());
<a name="195" href="#195">195</a> }
<a name="196" href="#196">196</a> <em class="comment">/*</em>
<a name="197" href="#197">197</a> <em class="comment"> * Third and forth step are performed by derefenceSTR()</em>
<a name="198" href="#198">198</a> <em class="comment"> */</em>
<a name="199" href="#199">199</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef = <strong>new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(
<a name="200" href="#200">200</a> WSSConfig.getDefaultWSConfig(), tmpEl);
<a name="201" href="#201">201</a>
<a name="202" href="#202">202</a> str = dereferenceSTR(thisDoc, secRef);
<a name="203" href="#203">203</a> <em class="comment">/*</em>
<a name="204" href="#204">204</a> <em class="comment"> * Keep in mind: the returned element belong to "thisDoc", thus</em>
<a name="205" href="#205">205</a> <em class="comment"> * import it to "doc" before replacing it.</em>
<a name="206" href="#206">206</a> <em class="comment"> *</em>
<a name="207" href="#207">207</a> <em class="comment"> * Fifth step: replace the STR with the above created/copied BST, feed</em>
<a name="208" href="#208">208</a> <em class="comment"> * this result in the specified c14n method and return this to</em>
<a name="209" href="#209">209</a> <em class="comment"> * the caller.</em>
<a name="210" href="#210">210</a> <em class="comment"> *</em>
<a name="211" href="#211">211</a> <em class="comment"> */</em>
<a name="212" href="#212">212</a> str = (Element) doc.importNode(str, <strong>true</strong>);
<a name="213" href="#213">213</a>
<a name="214" href="#214">214</a> Node parent = tmpEl.getParentNode(); <em class="comment">// point to document node</em>
<a name="215" href="#215">215</a> <em class="comment">// parent.replaceChild(str, tmpEl); // replace STR with new node</em>
<a name="216" href="#216">216</a> <em class="comment">//</em>
<a name="217" href="#217">217</a>
<a name="218" href="#218">218</a> <em class="comment">/*</em>
<a name="219" href="#219">219</a> <em class="comment"> * Alert: Hacks ahead</em>
<a name="220" href="#220">220</a> <em class="comment"> *</em>
<a name="221" href="#221">221</a> <em class="comment"> * TODO: Rework theses hacks after c14n was updated.</em>
<a name="222" href="#222">222</a> <em class="comment"> */</em>
<a name="223" href="#223">223</a>
<a name="224" href="#224">224</a> <em class="comment">/*</em>
<a name="225" href="#225">225</a> <em class="comment"> * HACK 1:</em>
<a name="226" href="#226">226</a> <em class="comment"> * Create a top level fake element with a defined default namespace</em>
<a name="227" href="#227">227</a> <em class="comment"> * setting (urn:X). Replace the STR node with this fake element that</em>
<a name="228" href="#228">228</a> <em class="comment"> * is now the top level element. Append our result element to the</em>
<a name="229" href="#229">229</a> <em class="comment"> * fake element, then call c14n. This forces the c14n to insert</em>
<a name="230" href="#230">230</a> <em class="comment"> * xmlns="" if necessary. However, before we handover the result we</em>
<a name="231" href="#231">231</a> <em class="comment"> * have to remove the fake element. See string buffer operation</em>
<a name="232" href="#232">232</a> <em class="comment"> * below.</em>
<a name="233" href="#233">233</a> <em class="comment"> */</em>
<a name="234" href="#234">234</a> Element tmpEl1 = doc.createElement(<span class="string">"temp"</span>);
<a name="235" href="#235">235</a> tmpEl1.setAttributeNS(WSConstants.XMLNS_NS, <span class="string">"xmlns"</span>, <span class="string">"urn:X"</span>);
<a name="236" href="#236">236</a> parent.replaceChild(tmpEl1, tmpEl); <em class="comment">// replace STR with new node</em>
<a name="237" href="#237">237</a>
<a name="238" href="#238">238</a> tmpEl1.appendChild(str);
<a name="239" href="#239">239</a> <em class="comment">// End of HACK 1</em>
<a name="240" href="#240">240</a>
<a name="241" href="#241">241</a> <em class="comment">// XMLUtils.circumventBug2650(doc); // No longer needed???</em>
<a name="242" href="#242">242</a>
<a name="243" href="#243">243</a> <em class="comment">/*</em>
<a name="244" href="#244">244</a> <em class="comment"> * C14n with specified algorithm. According to WSS Specification.</em>
<a name="245" href="#245">245</a> <em class="comment"> */</em>
<a name="246" href="#246">246</a> buf = canon.canonicalizeSubtree(doc, <span class="string">"#default"</span>);
<a name="247" href="#247">247</a>
<a name="248" href="#248">248</a> <em class="comment">// If the problem with c14n method is solved then just do:</em>
<a name="249" href="#249">249</a>
<a name="250" href="#250">250</a> <em class="comment">/*<em class="comment"> return new XMLSignatureInput(buf); */</em></em>
<a name="251" href="#251">251</a>
<a name="252" href="#252">252</a> <em class="comment">/*</em>
<a name="253" href="#253">253</a> <em class="comment"> * HACK 2</em>
<a name="254" href="#254">254</a> <em class="comment"> */</em>
<a name="255" href="#255">255</a> bos = <strong>new</strong> ByteArrayOutputStream(buf.length);
<a name="256" href="#256">256</a> bos.write(buf, 0, buf.length);
<a name="257" href="#257">257</a>
<a name="258" href="#258">258</a> <strong>if</strong> (doDebug) {
<a name="259" href="#259">259</a> log.debug(<span class="string">"after c14n: "</span> + bos.toString());
<a name="260" href="#260">260</a> }
<a name="261" href="#261">261</a>
<a name="262" href="#262">262</a> <em class="comment">/*</em>
<a name="263" href="#263">263</a> <em class="comment"> * Here we delete the previously inserted fake element from the</em>
<a name="264" href="#264">264</a> <em class="comment"> * serialized XML.</em>
<a name="265" href="#265">265</a> <em class="comment"> */</em>
<a name="266" href="#266">266</a> StringBuffer bf = <strong>new</strong> StringBuffer(bos.toString());
<a name="267" href="#267">267</a> String bf1 = bf.substring(<span class="string">"<temp xmlns=\"urn:X\">"</span>.length(), bf.length() - <span class="string">"</temp>"</span>.length());
<a name="268" href="#268">268</a>
<a name="269" href="#269">269</a> <strong>if</strong> (doDebug) {
<a name="270" href="#270">270</a> log.debug(<span class="string">"last result: "</span>);
<a name="271" href="#271">271</a> log.debug(bf1.toString());
<a name="272" href="#272">272</a> }
<a name="273" href="#273">273</a> <strong>return</strong> <strong>new</strong> XMLSignatureInput(bf1.getBytes());
<a name="274" href="#274">274</a> <em class="comment">// End of HACK 2</em>
<a name="275" href="#275">275</a>
<a name="276" href="#276">276</a> } <strong>catch</strong> (IOException ex) {
<a name="277" href="#277">277</a> <strong>throw</strong> <strong>new</strong> CanonicalizationException(<span class="string">"empty"</span>, ex);
<a name="278" href="#278">278</a> } <strong>catch</strong> (ParserConfigurationException ex) {
<a name="279" href="#279">279</a> <strong>throw</strong> <strong>new</strong> CanonicalizationException(<span class="string">"empty"</span>, ex);
<a name="280" href="#280">280</a> } <strong>catch</strong> (XMLSecurityException ex) {
<a name="281" href="#281">281</a> <strong>throw</strong> <strong>new</strong> CanonicalizationException(<span class="string">"empty"</span>, ex);
<a name="282" href="#282">282</a> } <strong>catch</strong> (SAXException ex) {
<a name="283" href="#283">283</a> <strong>throw</strong> <strong>new</strong> CanonicalizationException(<span class="string">"empty"</span>, ex);
<a name="284" href="#284">284</a> } <strong>catch</strong> (TransformerException ex) {
<a name="285" href="#285">285</a> <strong>throw</strong> <strong>new</strong> CanonicalizationException(<span class="string">"empty"</span>, ex);
<a name="286" href="#286">286</a> } <strong>catch</strong> (Exception ex) {
<a name="287" href="#287">287</a> <strong>throw</strong> <strong>new</strong> CanonicalizationException(<span class="string">"empty"</span>, ex);
<a name="288" href="#288">288</a> }
<a name="289" href="#289">289</a> }
<a name="290" href="#290">290</a>
<a name="291" href="#291">291</a> <strong>private</strong> Element dereferenceSTR(Document doc, <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef)
<a name="292" href="#292">292</a> throws Exception {
<a name="293" href="#293">293</a>
<a name="294" href="#294">294</a> <em class="comment">/*</em>
<a name="295" href="#295">295</a> <em class="comment"> * Third step: locate the security token referenced by the STR</em>
<a name="296" href="#296">296</a> <em class="comment"> * element. Either the Token is contained in the document as a</em>
<a name="297" href="#297">297</a> <em class="comment"> * BinarySecurityToken or stored in some key storage.</em>
<a name="298" href="#298">298</a> <em class="comment"> *</em>
<a name="299" href="#299">299</a> <em class="comment"> * Forth step: after security token was located, prepare it. If its</em>
<a name="300" href="#300">300</a> <em class="comment"> * reference via a direct reference, i.e. a relative URI that references</em>
<a name="301" href="#301">301</a> <em class="comment"> * the BST directly in the message then just return that element.</em>
<a name="302" href="#302">302</a> <em class="comment"> * Otherwise wrap the located token in a newly created BST element</em>
<a name="303" href="#303">303</a> <em class="comment"> * as described in WSS Specification.</em>
<a name="304" href="#304">304</a> <em class="comment"> *</em>
<a name="305" href="#305">305</a> <em class="comment"> * Note: every element (also newly created elements) belong to the</em>
<a name="306" href="#306">306</a> <em class="comment"> * document defined by the doc parameter. This is the main SOAP document</em>
<a name="307" href="#307">307</a> <em class="comment"> * (thisDoc) and _not_ the document part that is to be signed/verified. Thus</em>
<a name="308" href="#308">308</a> <em class="comment"> * the caller must import the returned element into the document</em>
<a name="309" href="#309">309</a> <em class="comment"> * part that is signed/verified.</em>
<a name="310" href="#310">310</a> <em class="comment"> *</em>
<a name="311" href="#311">311</a> <em class="comment"> */</em>
<a name="312" href="#312">312</a> Element tokElement = <strong>null</strong>;
<a name="313" href="#313">313</a>
<a name="314" href="#314">314</a> <em class="comment">/*</em>
<a name="315" href="#315">315</a> <em class="comment"> * First case: direct reference, according to chap 7.2 of OASIS</em>
<a name="316" href="#316">316</a> <em class="comment"> * WS specification (main document). Only in this case return</em>
<a name="317" href="#317">317</a> <em class="comment"> * a true reference to the BST. Copying is done by the caller.</em>
<a name="318" href="#318">318</a> <em class="comment"> */</em>
<a name="319" href="#319">319</a> <strong>if</strong> (secRef.containsReference()) {
<a name="320" href="#320">320</a> <strong>if</strong> (doDebug) {
<a name="321" href="#321">321</a> log.debug(<span class="string">"STR: Reference"</span>);
<a name="322" href="#322">322</a> }
<a name="323" href="#323">323</a> tokElement = secRef.getTokenElement(doc, wsDocInfo);
<a name="324" href="#324">324</a> <strong>if</strong> (tokElement == <strong>null</strong>) {
<a name="325" href="#325">325</a> <strong>throw</strong> <strong>new</strong> CanonicalizationException(<span class="string">"empty"</span>);
<a name="326" href="#326">326</a> }
<a name="327" href="#327">327</a> }
<a name="328" href="#328">328</a> <em class="comment">/*</em>
<a name="329" href="#329">329</a> <em class="comment"> * second case: IssuerSerial, first try to get embedded</em>
<a name="330" href="#330">330</a> <em class="comment"> * certificate, if that fails, lookup in keystore, wrap</em>
<a name="331" href="#331">331</a> <em class="comment"> * in BST according to specification</em>
<a name="332" href="#332">332</a> <em class="comment"> */</em>
<a name="333" href="#333">333</a> <strong>else</strong> <strong>if</strong> (secRef.containsX509IssuerSerial()) {
<a name="334" href="#334">334</a> <strong>if</strong> (doDebug) {
<a name="335" href="#335">335</a> log.debug(<span class="string">"STR: IssuerSerial"</span>);
<a name="336" href="#336">336</a> }
<a name="337" href="#337">337</a> X509Certificate cert = <strong>null</strong>;
<a name="338" href="#338">338</a> X509Security x509token = <strong>null</strong>;
<a name="339" href="#339">339</a> <em class="comment">// Disable check for embedded, always get from store (comment from Merlin,</em>
<a name="340" href="#340">340</a> <em class="comment">// Betrust)</em>
<a name="341" href="#341">341</a> <em class="comment">// x509token = secRef.getEmbeddedTokenFromIS(doc, wsDocInfo.getCrypto());</em>
<a name="342" href="#342">342</a> <strong>if</strong> (x509token != <strong>null</strong>) {
<a name="343" href="#343">343</a> cert = x509token.getX509Certificate(wsDocInfo.getCrypto());
<a name="344" href="#344">344</a> } <strong>else</strong> {
<a name="345" href="#345">345</a> X509Certificate[] certs = secRef.getX509IssuerSerial(wsDocInfo.getCrypto());
<a name="346" href="#346">346</a> <strong>if</strong> (certs == <strong>null</strong> || certs.length == 0 || certs[0] == <strong>null</strong>) {
<a name="347" href="#347">347</a> <strong>throw</strong> <strong>new</strong> CanonicalizationException(<span class="string">"empty"</span>);
<a name="348" href="#348">348</a> }
<a name="349" href="#349">349</a> cert = certs[0];
<a name="350" href="#350">350</a> }
<a name="351" href="#351">351</a> tokElement = createBST(doc, cert, secRef.getElement());
<a name="352" href="#352">352</a> }
<a name="353" href="#353">353</a> <em class="comment">/*</em>
<a name="354" href="#354">354</a> <em class="comment"> * third case: KeyIdentifier, must be SKI, first try to get embedded</em>
<a name="355" href="#355">355</a> <em class="comment"> * certificate, if that fails, lookup in keystore, wrap</em>
<a name="356" href="#356">356</a> <em class="comment"> * in BST according to specification. No other KeyIdentifier</em>
<a name="357" href="#357">357</a> <em class="comment"> * type handled here - just SKI</em>
<a name="358" href="#358">358</a> <em class="comment"> */</em>
<a name="359" href="#359">359</a> <strong>else</strong> <strong>if</strong> (secRef.containsKeyIdent<strong>if</strong>ier()) {
<a name="360" href="#360">360</a> <strong>if</strong> (doDebug) {
<a name="361" href="#361">361</a> log.debug(<span class="string">"STR: KeyIdentifier"</span>);
<a name="362" href="#362">362</a> }
<a name="363" href="#363">363</a> X509Certificate cert = <strong>null</strong>;
<a name="364" href="#364">364</a> X509Security x509token = <strong>null</strong>;
<a name="365" href="#365">365</a> <em class="comment">// Disable check for embedded, always get from store (comment from Merlin,</em>
<a name="366" href="#366">366</a> <em class="comment">// Betrust)</em>
<a name="367" href="#367">367</a> <em class="comment">// x509token = secRef.getEmbeddedTokenFromSKI(doc, wsDocInfo.getCrypto());</em>
<a name="368" href="#368">368</a> <strong>if</strong> (x509token != <strong>null</strong>) {
<a name="369" href="#369">369</a> cert = x509token.getX509Certificate(wsDocInfo.getCrypto());
<a name="370" href="#370">370</a> } <strong>else</strong> {
<a name="371" href="#371">371</a> X509Certificate[] certs = secRef.getKeyIdentifier(wsDocInfo.getCrypto());
<a name="372" href="#372">372</a> <strong>if</strong> (certs == <strong>null</strong> || certs.length == 0 || certs[0] == <strong>null</strong>) {
<a name="373" href="#373">373</a> <strong>throw</strong> <strong>new</strong> CanonicalizationException(<span class="string">"empty"</span>);
<a name="374" href="#374">374</a> }
<a name="375" href="#375">375</a> cert = certs[0];
<a name="376" href="#376">376</a> }
<a name="377" href="#377">377</a> tokElement = createBST(doc, cert, secRef.getElement());
<a name="378" href="#378">378</a> }
<a name="379" href="#379">379</a> <strong>return</strong> (Element) tokElement;
<a name="380" href="#380">380</a> }
<a name="381" href="#381">381</a>
<a name="382" href="#382">382</a> <strong>private</strong> Element createBST(Document doc,
<a name="383" href="#383">383</a> X509Certificate cert,
<a name="384" href="#384">384</a> Element secRefE)
<a name="385" href="#385">385</a> throws Exception {
<a name="386" href="#386">386</a> byte data[] = cert.getEncoded();
<a name="387" href="#387">387</a> String prefix = WSSecurityUtil.getPrefixNS(WSConstants.WSSE_NS, secRefE);
<a name="388" href="#388">388</a> Element elem =
<a name="389" href="#389">389</a> doc.createElementNS(WSConstants.WSSE_NS,
<a name="390" href="#390">390</a> prefix + <span class="string">":BinarySecurityToken"</span>);
<a name="391" href="#391">391</a> WSSecurityUtil.setNamespace(elem, WSConstants.WSSE_NS, prefix);
<a name="392" href="#392">392</a> elem.setAttributeNS(WSConstants.XMLNS_NS, <span class="string">"xmlns"</span>, <span class="string">""</span>);
<a name="393" href="#393">393</a> elem.setAttributeNS(<strong>null</strong>, <span class="string">"ValueType"</span>, X509Security.getType(WSSConfig.getDefaultWSConfig()));
<a name="394" href="#394">394</a> Text certText = doc.createTextNode(Base64.encode(data, 0)); <em class="comment">// no line wrap</em>
<a name="395" href="#395">395</a> elem.appendChild(certText);
<a name="396" href="#396">396</a> <strong>return</strong> elem;
<a name="397" href="#397">397</a> }
<a name="398" href="#398">398</a> }
</pre>
<hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
</html>