You are viewing a plain text version of this content. The canonical link for it is here.
Posted to wss4j-dev@ws.apache.org by co...@apache.org on 2009/04/20 15:56:38 UTC

svn commit: r766696 [33/36] - in /webservices/wss4j/site: ./ apidocs/ apidocs/org/apache/ws/axis/security/ apidocs/org/apache/ws/axis/security/class-use/ apidocs/org/apache/ws/axis/security/handler/ apidocs/org/apache/ws/axis/security/handler/class-use...

Modified: webservices/wss4j/site/xref/org/apache/ws/security/saml/WSSignSAMLEnvelope.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/saml/WSSignSAMLEnvelope.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/saml/WSSignSAMLEnvelope.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/saml/WSSignSAMLEnvelope.html Mon Apr 20 13:56:25 2009
@@ -167,7 +167,7 @@
 <a name="157" href="#157">157</a> <em class="jxr_comment">         * Gather some info about the document to process and store it for</em>
 <a name="158" href="#158">158</a> <em class="jxr_comment">         * retrieval</em>
 <a name="159" href="#159">159</a> <em class="jxr_comment">         */</em>
-<a name="160" href="#160">160</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a>(doc.hashCode());
+<a name="160" href="#160">160</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a>(doc);
 <a name="161" href="#161">161</a> 
 <a name="162" href="#162">162</a>         Element envelope = doc.getDocumentElement();
 <a name="163" href="#163">163</a>         <a href="../../../../../org/apache/ws/security/SOAPConstants.html">SOAPConstants</a> soapConstants = WSSecurityUtil.getSOAPConstants(envelope);
@@ -253,14 +253,14 @@
 <a name="243" href="#243">243</a>         }
 <a name="244" href="#244">244</a> 
 <a name="245" href="#245">245</a>         KeyInfo info = sig.getKeyInfo();
-<a name="246" href="#246">246</a>         String keyInfoUri = <span class="jxr_string">"KeyId-"</span> + info.hashCode();
+<a name="246" href="#246">246</a>         String keyInfoUri = wssConfig.getIdAllocator().createSecureId(<span class="jxr_string">"KeyId-"</span>, info);
 <a name="247" href="#247">247</a>         info.setId(keyInfoUri);
 <a name="248" href="#248">248</a> 
 <a name="249" href="#249">249</a>         <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(doc);
-<a name="250" href="#250">250</a>         String strUri = <span class="jxr_string">"STRId-"</span> + secRef.hashCode();
+<a name="250" href="#250">250</a>         String strUri = wssConfig.getIdAllocator().createSecureId(<span class="jxr_string">"STRId-"</span>, secRef);
 <a name="251" href="#251">251</a>         secRef.setID(strUri);
 <a name="252" href="#252">252</a> 
-<a name="253" href="#253">253</a>         String certUri = <span class="jxr_string">"CertId-"</span> + certs[0].hashCode();
+<a name="253" href="#253">253</a>         String certUri = wssConfig.getIdAllocator().createSecureId(<span class="jxr_string">"CertId-"</span>, certs[0]);
 <a name="254" href="#254">254</a> 
 <a name="255" href="#255">255</a>         <strong class="jxr_keyword">if</strong> (tlog.isDebugEnabled()) {
 <a name="256" href="#256">256</a>             t1 = System.currentTimeMillis();
@@ -288,7 +288,7 @@
 <a name="278" href="#278">278</a>         <strong class="jxr_keyword">try</strong> {
 <a name="279" href="#279">279</a>             <strong class="jxr_keyword">if</strong> (senderVouches) {
 <a name="280" href="#280">280</a>                 secRefSaml = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(doc);
-<a name="281" href="#281">281</a>                 String strSamlUri = <span class="jxr_string">"STRSAMLId-"</span> + secRefSaml.hashCode();
+<a name="281" href="#281">281</a>                 String strSamlUri = wssConfig.getIdAllocator().createSecureId(<span class="jxr_string">"STRSAMLId-"</span>, secRefSaml);
 <a name="282" href="#282">282</a>                 secRefSaml.setID(strSamlUri);
 <a name="283" href="#283">283</a>                 <em class="jxr_comment">// Decouple Refernce/KeyInfo setup - quick shot here</em>
 <a name="284" href="#284">284</a>                 <a href="../../../../../org/apache/ws/security/message/token/Reference.html">Reference</a> ref = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/Reference.html">Reference</a>(doc);
@@ -428,7 +428,7 @@
 <a name="418" href="#418">418</a>         wsDocInfo.setAssertion(samlToken);
 <a name="419" href="#419">419</a>         WSSecurityUtil.prependChildElement(securityHeader, samlToken);
 <a name="420" href="#420">420</a> 
-<a name="421" href="#421">421</a>         WSDocInfoStore.store(wsDocInfo);
+<a name="421" href="#421">421</a>         <strong class="jxr_keyword">boolean</strong> remove = WSDocInfoStore.store(wsDocInfo);
 <a name="422" href="#422">422</a>         <strong class="jxr_keyword">try</strong> {
 <a name="423" href="#423">423</a>             <strong class="jxr_keyword">if</strong> (senderVouches) {
 <a name="424" href="#424">424</a>                 sig
@@ -445,21 +445,23 @@
 <a name="435" href="#435">435</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_SIGNATURE,
 <a name="436" href="#436">436</a>                     <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, e1);
 <a name="437" href="#437">437</a>         } <strong class="jxr_keyword">finally</strong> {
-<a name="438" href="#438">438</a>             WSDocInfoStore.delete(wsDocInfo);
-<a name="439" href="#439">439</a>         }
-<a name="440" href="#440">440</a>         <strong class="jxr_keyword">if</strong> (tlog.isDebugEnabled()) {
-<a name="441" href="#441">441</a>             t4 = System.currentTimeMillis();
-<a name="442" href="#442">442</a>             tlog.debug(<span class="jxr_string">"SignEnvelope: cre-Sig= "</span> + (t1 - t0)
-<a name="443" href="#443">443</a>                     + <span class="jxr_string">" set transform= "</span> + (t2 - t1) + <span class="jxr_string">" sec-ref= "</span> + (t3 - t2)
-<a name="444" href="#444">444</a>                     + <span class="jxr_string">" signature= "</span> + (t4 - t3));
-<a name="445" href="#445">445</a>         }
-<a name="446" href="#446">446</a>         <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="447" href="#447">447</a>             log.debug(<span class="jxr_string">"Signing complete."</span>);
-<a name="448" href="#448">448</a>         }
-<a name="449" href="#449">449</a>         <strong class="jxr_keyword">return</strong> (doc);
-<a name="450" href="#450">450</a> 
-<a name="451" href="#451">451</a>     }
-<a name="452" href="#452">452</a> }
+<a name="438" href="#438">438</a>             <strong class="jxr_keyword">if</strong> (remove) {
+<a name="439" href="#439">439</a>                 WSDocInfoStore.delete(wsDocInfo);
+<a name="440" href="#440">440</a>             }
+<a name="441" href="#441">441</a>         }
+<a name="442" href="#442">442</a>         <strong class="jxr_keyword">if</strong> (tlog.isDebugEnabled()) {
+<a name="443" href="#443">443</a>             t4 = System.currentTimeMillis();
+<a name="444" href="#444">444</a>             tlog.debug(<span class="jxr_string">"SignEnvelope: cre-Sig= "</span> + (t1 - t0)
+<a name="445" href="#445">445</a>                     + <span class="jxr_string">" set transform= "</span> + (t2 - t1) + <span class="jxr_string">" sec-ref= "</span> + (t3 - t2)
+<a name="446" href="#446">446</a>                     + <span class="jxr_string">" signature= "</span> + (t4 - t3));
+<a name="447" href="#447">447</a>         }
+<a name="448" href="#448">448</a>         <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="449" href="#449">449</a>             log.debug(<span class="jxr_string">"Signing complete."</span>);
+<a name="450" href="#450">450</a>         }
+<a name="451" href="#451">451</a>         <strong class="jxr_keyword">return</strong> (doc);
+<a name="452" href="#452">452</a> 
+<a name="453" href="#453">453</a>     }
+<a name="454" href="#454">454</a> }
 </pre>
 <hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
 </html>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/saml/package-frame.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/saml/package-frame.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/saml/package-frame.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/saml/package-frame.html Mon Apr 20 13:56:25 2009
@@ -3,7 +3,7 @@
 <html xml:lang="en" lang="en">
 	<head>
 		<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
-		<title>WSS4J 1.5.6 Reference Package org.apache.ws.security.saml</title>
+		<title>WSS4J 1.5.7 Reference Package org.apache.ws.security.saml</title>
 		<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="style" />
 	</head>
 	<body>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/saml/package-summary.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/saml/package-summary.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/saml/package-summary.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/saml/package-summary.html Mon Apr 20 13:56:25 2009
@@ -3,7 +3,7 @@
 <html xml:lang="en" lang="en">
 	<head>
 		<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
-		<title>WSS4J 1.5.6 Reference Package org.apache.ws.security.saml</title>
+		<title>WSS4J 1.5.7 Reference Package org.apache.ws.security.saml</title>
 		<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="style" />
 	</head>
 	<body>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/transform/STRTransform.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/transform/STRTransform.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/transform/STRTransform.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/transform/STRTransform.html Mon Apr 20 13:56:25 2009
@@ -40,304 +40,307 @@
 <a name="30" href="#30">30</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.c14n.Canonicalizer;
 <a name="31" href="#31">31</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.c14n.InvalidCanonicalizerException;
 <a name="32" href="#32">32</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.signature.XMLSignatureInput;
-<a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.transforms.TransformSpi;
-<a name="34" href="#34">34</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.Base64;
-<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.utils.XMLUtils;
-<a name="36" href="#36">36</a>  
-<a name="37" href="#37">37</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Document;
-<a name="38" href="#38">38</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
-<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Text;
-<a name="40" href="#40">40</a>  
-<a name="41" href="#41">41</a>  <strong class="jxr_keyword">import</strong> java.io.ByteArrayOutputStream;
-<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> java.io.IOException;
-<a name="43" href="#43">43</a>  <strong class="jxr_keyword">import</strong> java.security.cert.CertificateEncodingException;
-<a name="44" href="#44">44</a>  <strong class="jxr_keyword">import</strong> java.security.cert.X509Certificate;
-<a name="45" href="#45">45</a>  
-<a name="46" href="#46">46</a>  <em class="jxr_javadoccomment">/**</em>
-<a name="47" href="#47">47</a>  <em class="jxr_javadoccomment"> * Class STRTransform</em>
-<a name="48" href="#48">48</a>  <em class="jxr_javadoccomment"> * </em>
-<a name="49" href="#49">49</a>  <em class="jxr_javadoccomment"> * @author Werner Dittmann (Werner.Dittmann@siemens.com)</em>
-<a name="50" href="#50">50</a>  <em class="jxr_javadoccomment"> * @version 1.0</em>
-<a name="51" href="#51">51</a>  <em class="jxr_javadoccomment"> */</em>
-<a name="52" href="#52">52</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/transform/STRTransform.html">STRTransform</a> <strong class="jxr_keyword">extends</strong> TransformSpi {
-<a name="53" href="#53">53</a>  
-<a name="54" href="#54">54</a>      <em class="jxr_javadoccomment">/**</em>
-<a name="55" href="#55">55</a>  <em class="jxr_javadoccomment">     * Field implementedTransformURI</em>
-<a name="56" href="#56">56</a>  <em class="jxr_javadoccomment">     */</em>
-<a name="57" href="#57">57</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> String implementedTransformURI = <span class="jxr_string">"http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#STR-Transform"</span>;
-<a name="58" href="#58">58</a>  
-<a name="59" href="#59">59</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> Log log = LogFactory.getLog(STRTransform.<strong class="jxr_keyword">class</strong>.getName());
-<a name="60" href="#60">60</a>  
-<a name="61" href="#61">61</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">boolean</strong> doDebug = false;
-<a name="62" href="#62">62</a>  
-<a name="63" href="#63">63</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> String XMLNS = <span class="jxr_string">"xmlns="</span>;
-<a name="64" href="#64">64</a>  
-<a name="65" href="#65">65</a>      <strong class="jxr_keyword">private</strong> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo = <strong class="jxr_keyword">null</strong>;
-<a name="66" href="#66">66</a>  
-<a name="67" href="#67">67</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> wantsOctetStream() {
-<a name="68" href="#68">68</a>          <strong class="jxr_keyword">return</strong> false;
-<a name="69" href="#69">69</a>      }
-<a name="70" href="#70">70</a>  
-<a name="71" href="#71">71</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> wantsNodeSet() {
-<a name="72" href="#72">72</a>          <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">true</strong>;
-<a name="73" href="#73">73</a>      }
-<a name="74" href="#74">74</a>  
-<a name="75" href="#75">75</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> returnsOctetStream() {
-<a name="76" href="#76">76</a>          <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">true</strong>;
-<a name="77" href="#77">77</a>      }
-<a name="78" href="#78">78</a>  
-<a name="79" href="#79">79</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> returnsNodeSet() {
-<a name="80" href="#80">80</a>          <strong class="jxr_keyword">return</strong> false;
-<a name="81" href="#81">81</a>      }
-<a name="82" href="#82">82</a>  
-<a name="83" href="#83">83</a>      <em class="jxr_javadoccomment">/**</em>
-<a name="84" href="#84">84</a>  <em class="jxr_javadoccomment">     * Method engineGetURI</em>
-<a name="85" href="#85">85</a>  <em class="jxr_javadoccomment">     */</em>
-<a name="86" href="#86">86</a>      <strong class="jxr_keyword">protected</strong> String engineGetURI() {
-<a name="87" href="#87">87</a>          <strong class="jxr_keyword">return</strong> STRTransform.implementedTransformURI;
-<a name="88" href="#88">88</a>      }
-<a name="89" href="#89">89</a>  
-<a name="90" href="#90">90</a>      <em class="jxr_javadoccomment">/**</em>
-<a name="91" href="#91">91</a>  <em class="jxr_javadoccomment">     * Method enginePerformTransform</em>
-<a name="92" href="#92">92</a>  <em class="jxr_javadoccomment">     * </em>
-<a name="93" href="#93">93</a>  <em class="jxr_javadoccomment">     * @param input</em>
-<a name="94" href="#94">94</a>  <em class="jxr_javadoccomment">     * @throws CanonicalizationException</em>
-<a name="95" href="#95">95</a>  <em class="jxr_javadoccomment">     * @throws InvalidCanonicalizerException</em>
-<a name="96" href="#96">96</a>  <em class="jxr_javadoccomment">     */</em>
-<a name="97" href="#97">97</a>      <strong class="jxr_keyword">protected</strong> XMLSignatureInput enginePerformTransform(XMLSignatureInput input)
-<a name="98" href="#98">98</a>          <strong class="jxr_keyword">throws</strong> IOException, CanonicalizationException, InvalidCanonicalizerException {
-<a name="99" href="#99">99</a>          doDebug = log.isDebugEnabled();
-<a name="100" href="#100">100</a> 
-<a name="101" href="#101">101</a>         <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="102" href="#102">102</a>             log.debug(<span class="jxr_string">"Beginning STRTransform..."</span> + input.toString());
-<a name="103" href="#103">103</a>         }
-<a name="104" href="#104">104</a> 
-<a name="105" href="#105">105</a>         <strong class="jxr_keyword">try</strong> {
-<a name="106" href="#106">106</a>             <em class="jxr_comment">//</em>
-<a name="107" href="#107">107</a>             <em class="jxr_comment">// Get the main document, that is the complete SOAP request document</em>
+<a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.transforms.Transform;
+<a name="34" href="#34">34</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.transforms.TransformSpi;
+<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.Base64;
+<a name="36" href="#36">36</a>  <strong class="jxr_keyword">import</strong> org.apache.xml.security.utils.XMLUtils;
+<a name="37" href="#37">37</a>  
+<a name="38" href="#38">38</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Document;
+<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
+<a name="40" href="#40">40</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Text;
+<a name="41" href="#41">41</a>  
+<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> java.io.ByteArrayOutputStream;
+<a name="43" href="#43">43</a>  <strong class="jxr_keyword">import</strong> java.io.IOException;
+<a name="44" href="#44">44</a>  <strong class="jxr_keyword">import</strong> java.security.cert.CertificateEncodingException;
+<a name="45" href="#45">45</a>  <strong class="jxr_keyword">import</strong> java.security.cert.X509Certificate;
+<a name="46" href="#46">46</a>  
+<a name="47" href="#47">47</a>  <em class="jxr_javadoccomment">/**</em>
+<a name="48" href="#48">48</a>  <em class="jxr_javadoccomment"> * Class STRTransform</em>
+<a name="49" href="#49">49</a>  <em class="jxr_javadoccomment"> * </em>
+<a name="50" href="#50">50</a>  <em class="jxr_javadoccomment"> * @author Werner Dittmann (Werner.Dittmann@siemens.com)</em>
+<a name="51" href="#51">51</a>  <em class="jxr_javadoccomment"> * @version 1.0</em>
+<a name="52" href="#52">52</a>  <em class="jxr_javadoccomment"> */</em>
+<a name="53" href="#53">53</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/transform/STRTransform.html">STRTransform</a> <strong class="jxr_keyword">extends</strong> TransformSpi {
+<a name="54" href="#54">54</a>  
+<a name="55" href="#55">55</a>      <em class="jxr_javadoccomment">/**</em>
+<a name="56" href="#56">56</a>  <em class="jxr_javadoccomment">     * Field implementedTransformURI</em>
+<a name="57" href="#57">57</a>  <em class="jxr_javadoccomment">     */</em>
+<a name="58" href="#58">58</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> String implementedTransformURI = <span class="jxr_string">"http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#STR-Transform"</span>;
+<a name="59" href="#59">59</a>  
+<a name="60" href="#60">60</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> Log log = LogFactory.getLog(STRTransform.<strong class="jxr_keyword">class</strong>.getName());
+<a name="61" href="#61">61</a>  
+<a name="62" href="#62">62</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">boolean</strong> doDebug = false;
+<a name="63" href="#63">63</a>  
+<a name="64" href="#64">64</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> String XMLNS = <span class="jxr_string">"xmlns="</span>;
+<a name="65" href="#65">65</a>  
+<a name="66" href="#66">66</a>      <strong class="jxr_keyword">private</strong> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo = <strong class="jxr_keyword">null</strong>;
+<a name="67" href="#67">67</a>      
+<a name="68" href="#68">68</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> wantsOctetStream() {
+<a name="69" href="#69">69</a>          <strong class="jxr_keyword">return</strong> false;
+<a name="70" href="#70">70</a>      }
+<a name="71" href="#71">71</a>  
+<a name="72" href="#72">72</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> wantsNodeSet() {
+<a name="73" href="#73">73</a>          <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">true</strong>;
+<a name="74" href="#74">74</a>      }
+<a name="75" href="#75">75</a>  
+<a name="76" href="#76">76</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> returnsOctetStream() {
+<a name="77" href="#77">77</a>          <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">true</strong>;
+<a name="78" href="#78">78</a>      }
+<a name="79" href="#79">79</a>  
+<a name="80" href="#80">80</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> returnsNodeSet() {
+<a name="81" href="#81">81</a>          <strong class="jxr_keyword">return</strong> false;
+<a name="82" href="#82">82</a>      }
+<a name="83" href="#83">83</a>  
+<a name="84" href="#84">84</a>      <em class="jxr_javadoccomment">/**</em>
+<a name="85" href="#85">85</a>  <em class="jxr_javadoccomment">     * Method engineGetURI</em>
+<a name="86" href="#86">86</a>  <em class="jxr_javadoccomment">     */</em>
+<a name="87" href="#87">87</a>      <strong class="jxr_keyword">protected</strong> String engineGetURI() {
+<a name="88" href="#88">88</a>          <strong class="jxr_keyword">return</strong> STRTransform.implementedTransformURI;
+<a name="89" href="#89">89</a>      }
+<a name="90" href="#90">90</a>  
+<a name="91" href="#91">91</a>      <em class="jxr_javadoccomment">/**</em>
+<a name="92" href="#92">92</a>  <em class="jxr_javadoccomment">     * Method enginePerformTransform</em>
+<a name="93" href="#93">93</a>  <em class="jxr_javadoccomment">     * </em>
+<a name="94" href="#94">94</a>  <em class="jxr_javadoccomment">     * @param input</em>
+<a name="95" href="#95">95</a>  <em class="jxr_javadoccomment">     * @throws CanonicalizationException</em>
+<a name="96" href="#96">96</a>  <em class="jxr_javadoccomment">     * @throws InvalidCanonicalizerException</em>
+<a name="97" href="#97">97</a>  <em class="jxr_javadoccomment">     */</em>
+<a name="98" href="#98">98</a>      <strong class="jxr_keyword">protected</strong> XMLSignatureInput enginePerformTransform(XMLSignatureInput input, 
+<a name="99" href="#99">99</a>                                                         Transform transformObject)
+<a name="100" href="#100">100</a>         <strong class="jxr_keyword">throws</strong> IOException, CanonicalizationException, InvalidCanonicalizerException {
+<a name="101" href="#101">101</a>         doDebug = log.isDebugEnabled();
+<a name="102" href="#102">102</a> 
+<a name="103" href="#103">103</a>         <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="104" href="#104">104</a>             log.debug(<span class="jxr_string">"Beginning STRTransform..."</span> + input.toString());
+<a name="105" href="#105">105</a>         }
+<a name="106" href="#106">106</a> 
+<a name="107" href="#107">107</a>         <strong class="jxr_keyword">try</strong> {
 <a name="108" href="#108">108</a>             <em class="jxr_comment">//</em>
-<a name="109" href="#109">109</a>             Document thisDoc = <strong class="jxr_keyword">this</strong>._transformObject.getDocument();
-<a name="110" href="#110">110</a>             <strong class="jxr_keyword">int</strong> docHash = thisDoc.hashCode();
-<a name="111" href="#111">111</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="112" href="#112">112</a>                 log.debug(<span class="jxr_string">"doc: "</span> + thisDoc.toString() + <span class="jxr_string">", "</span> + docHash);
-<a name="113" href="#113">113</a>             }
-<a name="114" href="#114">114</a>             <em class="jxr_comment">//</em>
-<a name="115" href="#115">115</a>             <em class="jxr_comment">// Here we get some information about the document that is being</em>
-<a name="116" href="#116">116</a>             <em class="jxr_comment">// processed, in particular the crypto implementation, and already</em>
-<a name="117" href="#117">117</a>             <em class="jxr_comment">// detected BST that may be used later during dereferencing.</em>
-<a name="118" href="#118">118</a>             <em class="jxr_comment">//</em>
-<a name="119" href="#119">119</a>             wsDocInfo = WSDocInfoStore.lookup(docHash);
-<a name="120" href="#120">120</a>             <strong class="jxr_keyword">if</strong> (wsDocInfo == <strong class="jxr_keyword">null</strong>) {
-<a name="121" href="#121">121</a>                 <strong class="jxr_keyword">throw</strong> (<strong class="jxr_keyword">new</strong> CanonicalizationException(<span class="jxr_string">"no WSDocInfo found"</span>));
-<a name="122" href="#122">122</a>             }
-<a name="123" href="#123">123</a>             <em class="jxr_comment">//</em>
-<a name="124" href="#124">124</a>             <em class="jxr_comment">// According to the OASIS WS Specification "Web Services Security:</em>
-<a name="125" href="#125">125</a>             <em class="jxr_comment">// SOAP Message Security 1.0" Monday, 19 January 2004, chapter 8.3</em>
-<a name="126" href="#126">126</a>             <em class="jxr_comment">// describes that the input node set must be processed by the c14n</em>
-<a name="127" href="#127">127</a>             <em class="jxr_comment">// that is specified in the argument element of the STRTransform</em>
-<a name="128" href="#128">128</a>             <em class="jxr_comment">// element.</em>
-<a name="129" href="#129">129</a>             <em class="jxr_comment">// </em>
-<a name="130" href="#130">130</a>             <em class="jxr_comment">// First step: Get the required c14n argument and get the specified</em>
-<a name="131" href="#131">131</a>             <em class="jxr_comment">// Canonicalizer</em>
-<a name="132" href="#132">132</a>             <em class="jxr_comment">//</em>
-<a name="133" href="#133">133</a>             String canonAlgo = <strong class="jxr_keyword">null</strong>;
-<a name="134" href="#134">134</a>             <strong class="jxr_keyword">if</strong> (<strong class="jxr_keyword">this</strong>._transformObject.length(
-<a name="135" href="#135">135</a>                 WSConstants.WSSE_NS, <span class="jxr_string">"TransformationParameters"</span>) == 1) {
-<a name="136" href="#136">136</a>                 Element tmpE = 
-<a name="137" href="#137">137</a>                     XMLUtils.selectNode(
-<a name="138" href="#138">138</a>                         <strong class="jxr_keyword">this</strong>._transformObject.getElement().getFirstChild(), 
-<a name="139" href="#139">139</a>                         WSConstants.WSSE_NS,
-<a name="140" href="#140">140</a>                         <span class="jxr_string">"TransformationParameters"</span>, 
-<a name="141" href="#141">141</a>                         0
-<a name="142" href="#142">142</a>                     );
-<a name="143" href="#143">143</a>                 Element canonElem = 
-<a name="144" href="#144">144</a>                     (Element) WSSecurityUtil.getDirectChild(
-<a name="145" href="#145">145</a>                         tmpE, <span class="jxr_string">"CanonicalizationMethod"</span>, WSConstants.SIG_NS
-<a name="146" href="#146">146</a>                     );
-<a name="147" href="#147">147</a>                 canonAlgo = canonElem.getAttribute(<span class="jxr_string">"Algorithm"</span>);
-<a name="148" href="#148">148</a>                 <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="149" href="#149">149</a>                     log.debug(<span class="jxr_string">"CanonAlgo: "</span> + canonAlgo);
-<a name="150" href="#150">150</a>                 }
-<a name="151" href="#151">151</a>             }
-<a name="152" href="#152">152</a>             Canonicalizer canon = Canonicalizer.getInstance(canonAlgo);
-<a name="153" href="#153">153</a> 
-<a name="154" href="#154">154</a>             ByteArrayOutputStream bos = <strong class="jxr_keyword">null</strong>;
-<a name="155" href="#155">155</a>             byte[] buf = <strong class="jxr_keyword">null</strong>;
-<a name="156" href="#156">156</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="157" href="#157">157</a>                 buf = input.getBytes();
-<a name="158" href="#158">158</a>                 bos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream(buf.length);
-<a name="159" href="#159">159</a>                 bos.write(buf, 0, buf.length);
-<a name="160" href="#160">160</a>                 log.debug(<span class="jxr_string">"canon bos: "</span> + bos.toString());
-<a name="161" href="#161">161</a>             }
-<a name="162" href="#162">162</a> 
-<a name="163" href="#163">163</a>             <em class="jxr_comment">//</em>
-<a name="164" href="#164">164</a>             <em class="jxr_comment">// Get the input (node) to transform. Currently we support only an</em>
-<a name="165" href="#165">165</a>             <em class="jxr_comment">// Element as input format. If other formats are required we must</em>
-<a name="166" href="#166">166</a>             <em class="jxr_comment">// get it as bytes and probably reparse it into a DOM tree (How to</em>
-<a name="167" href="#167">167</a>             <em class="jxr_comment">// work with nodesets? how to select the right node from a nodeset?)</em>
-<a name="168" href="#168">168</a>             <em class="jxr_comment">//</em>
-<a name="169" href="#169">169</a>             Element str = <strong class="jxr_keyword">null</strong>;
-<a name="170" href="#170">170</a>             <strong class="jxr_keyword">if</strong> (input.isElement()) {
-<a name="171" href="#171">171</a>                 str = (Element) input.getSubNode();
-<a name="172" href="#172">172</a>             } <strong class="jxr_keyword">else</strong> {
-<a name="173" href="#173">173</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> CanonicalizationException(
-<a name="174" href="#174">174</a>                     <span class="jxr_string">"Wrong input format - only element input supported"</span>
-<a name="175" href="#175">175</a>                 );
-<a name="176" href="#176">176</a>             }
-<a name="177" href="#177">177</a> 
-<a name="178" href="#178">178</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="179" href="#179">179</a>                 log.debug(<span class="jxr_string">"STR: "</span> + str.toString());
-<a name="180" href="#180">180</a>             }
-<a name="181" href="#181">181</a>             <em class="jxr_comment">//</em>
-<a name="182" href="#182">182</a>             <em class="jxr_comment">// The element to transform MUST be a SecurityTokenReference</em>
-<a name="183" href="#183">183</a>             <em class="jxr_comment">// element.</em>
-<a name="184" href="#184">184</a>             <em class="jxr_comment">//</em>
-<a name="185" href="#185">185</a>             <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(str);
-<a name="186" href="#186">186</a>             <em class="jxr_comment">//</em>
-<a name="187" href="#187">187</a>             <em class="jxr_comment">// Third and forth step are performed by derefenceSTR()</em>
-<a name="188" href="#188">188</a>             <em class="jxr_comment">//</em>
-<a name="189" href="#189">189</a>             Element dereferencedToken = dereferenceSTR(thisDoc, secRef);
-<a name="190" href="#190">190</a>             <em class="jxr_comment">//</em>
-<a name="191" href="#191">191</a>             <em class="jxr_comment">// C14n with specified algorithm. According to WSS Specification.</em>
-<a name="192" href="#192">192</a>             <em class="jxr_comment">//</em>
-<a name="193" href="#193">193</a>             buf = canon.canonicalizeSubtree(dereferencedToken, <span class="jxr_string">"#default"</span>);
-<a name="194" href="#194">194</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="195" href="#195">195</a>                 bos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream(buf.length);
-<a name="196" href="#196">196</a>                 bos.write(buf, 0, buf.length);
-<a name="197" href="#197">197</a>                 log.debug(<span class="jxr_string">"after c14n: "</span> + bos.toString());
-<a name="198" href="#198">198</a>             }
-<a name="199" href="#199">199</a> 
-<a name="200" href="#200">200</a>             <em class="jxr_comment">//</em>
-<a name="201" href="#201">201</a>             <em class="jxr_comment">// Alert: Hacks ahead According to WSS spec an Apex node must</em>
-<a name="202" href="#202">202</a>             <em class="jxr_comment">// contain a default namespace. If none is availabe in the first</em>
-<a name="203" href="#203">203</a>             <em class="jxr_comment">// node of the c14n output (this is the apex element) then we do</em>
-<a name="204" href="#204">204</a>             <em class="jxr_comment">// some editing to insert an empty default namespace</em>
-<a name="205" href="#205">205</a>             <em class="jxr_comment">// </em>
-<a name="206" href="#206">206</a>             <em class="jxr_comment">// TODO: Rework theses hacks after c14n was updated and can be</em>
-<a name="207" href="#207">207</a>             <em class="jxr_comment">// instructed to insert empty default namespace if required</em>
-<a name="208" href="#208">208</a>             <em class="jxr_comment">//</em>
-<a name="209" href="#209">209</a>             <em class="jxr_comment">// If the problem with c14n method is solved then just do:</em>
-<a name="210" href="#210">210</a>             <em class="jxr_comment">// return new XMLSignatureInput(buf);</em>
-<a name="211" href="#211">211</a>             
-<a name="212" href="#212">212</a>             <em class="jxr_comment">// start of HACK</em>
-<a name="213" href="#213">213</a>             StringBuffer bf = <strong class="jxr_keyword">new</strong> StringBuffer(<strong class="jxr_keyword">new</strong> String(buf));
-<a name="214" href="#214">214</a>             String bf1 = bf.toString();
-<a name="215" href="#215">215</a> 
-<a name="216" href="#216">216</a>             <em class="jxr_comment">//</em>
-<a name="217" href="#217">217</a>             <em class="jxr_comment">// Find start and end of first element &lt;....&gt;, this is the Apex node</em>
-<a name="218" href="#218">218</a>             <em class="jxr_comment">//</em>
-<a name="219" href="#219">219</a>             <strong class="jxr_keyword">int</strong> gt = bf1.indexOf(<span class="jxr_string">"&gt;"</span>);
-<a name="220" href="#220">220</a>             <em class="jxr_comment">//</em>
-<a name="221" href="#221">221</a>             <em class="jxr_comment">// Lookup the default namespace</em>
-<a name="222" href="#222">222</a>             <em class="jxr_comment">//</em>
-<a name="223" href="#223">223</a>             <strong class="jxr_keyword">int</strong> idx = bf1.indexOf(XMLNS);
-<a name="224" href="#224">224</a>             <em class="jxr_comment">//</em>
-<a name="225" href="#225">225</a>             <em class="jxr_comment">// If none found or if it is outside of this (Apex) element look for</em>
-<a name="226" href="#226">226</a>             <em class="jxr_comment">// first blank in, insert default namespace there (this is the</em>
-<a name="227" href="#227">227</a>             <em class="jxr_comment">// correct place according to c14n specification)</em>
-<a name="228" href="#228">228</a>             <em class="jxr_comment">//</em>
-<a name="229" href="#229">229</a>             <strong class="jxr_keyword">if</strong> (idx &lt; 0 || idx &gt; gt) {
-<a name="230" href="#230">230</a>                 idx = bf1.indexOf(<span class="jxr_string">" "</span>);
-<a name="231" href="#231">231</a>                 bf.insert(idx + 1, <span class="jxr_string">"xmlns=\&quot;\&quot; "</span>);
-<a name="232" href="#232">232</a>                 bf1 = bf.toString();
-<a name="233" href="#233">233</a>             }
-<a name="234" href="#234">234</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="235" href="#235">235</a>                 log.debug(<span class="jxr_string">"last result: "</span>);
-<a name="236" href="#236">236</a>                 log.debug(bf1);
-<a name="237" href="#237">237</a>             }
-<a name="238" href="#238">238</a>             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> XMLSignatureInput(bf1.getBytes());
-<a name="239" href="#239">239</a>         }
-<a name="240" href="#240">240</a>         <em class="jxr_comment">// End of HACK</em>
-<a name="241" href="#241">241</a>         <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) {
-<a name="242" href="#242">242</a>             <strong class="jxr_keyword">throw</strong> (<strong class="jxr_keyword">new</strong> CanonicalizationException(<span class="jxr_string">"WS Security Exception"</span>, ex));
-<a name="243" href="#243">243</a>         }
-<a name="244" href="#244">244</a>     }
-<a name="245" href="#245">245</a> 
-<a name="246" href="#246">246</a>     <strong class="jxr_keyword">private</strong> Element dereferenceSTR(Document doc, <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef)
-<a name="247" href="#247">247</a>         <strong class="jxr_keyword">throws</strong>  WSSecurityException {
-<a name="248" href="#248">248</a>         <em class="jxr_comment">//</em>
-<a name="249" href="#249">249</a>         <em class="jxr_comment">// Third step: locate the security token referenced by the STR element.</em>
-<a name="250" href="#250">250</a>         <em class="jxr_comment">// Either the Token is contained in the document as a</em>
-<a name="251" href="#251">251</a>         <em class="jxr_comment">// BinarySecurityToken or stored in some key storage.</em>
-<a name="252" href="#252">252</a>         <em class="jxr_comment">// </em>
-<a name="253" href="#253">253</a>         <em class="jxr_comment">// Fourth step: after security token was located, prepare it. If its</em>
-<a name="254" href="#254">254</a>         <em class="jxr_comment">// reference via a direct reference, i.e. a relative URI that references</em>
-<a name="255" href="#255">255</a>         <em class="jxr_comment">// the BST directly in the message then just return that element.</em>
-<a name="256" href="#256">256</a>         <em class="jxr_comment">// Otherwise wrap the located token in a newly created BST element as</em>
-<a name="257" href="#257">257</a>         <em class="jxr_comment">// described in WSS Specification.</em>
-<a name="258" href="#258">258</a>         <em class="jxr_comment">// </em>
-<a name="259" href="#259">259</a>         <em class="jxr_comment">//</em>
-<a name="260" href="#260">260</a>         Element tokElement = <strong class="jxr_keyword">null</strong>;
-<a name="261" href="#261">261</a> 
-<a name="262" href="#262">262</a>         <em class="jxr_comment">//</em>
-<a name="263" href="#263">263</a>         <em class="jxr_comment">// First case: direct reference, according to chap 7.2 of OASIS WS</em>
-<a name="264" href="#264">264</a>         <em class="jxr_comment">// specification (main document). Only in this case return a true</em>
-<a name="265" href="#265">265</a>         <em class="jxr_comment">// reference to the BST. Copying is done by the caller.</em>
-<a name="266" href="#266">266</a>         <em class="jxr_comment">//</em>
-<a name="267" href="#267">267</a>         <strong class="jxr_keyword">if</strong> (secRef.containsReference()) {
-<a name="268" href="#268">268</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="269" href="#269">269</a>                 log.debug(<span class="jxr_string">"STR: Reference"</span>);
-<a name="270" href="#270">270</a>             }
-<a name="271" href="#271">271</a>             tokElement = secRef.getTokenElement(doc, wsDocInfo, <strong class="jxr_keyword">null</strong>);
-<a name="272" href="#272">272</a>         }
-<a name="273" href="#273">273</a>         <em class="jxr_comment">//</em>
-<a name="274" href="#274">274</a>         <em class="jxr_comment">// second case: IssuerSerial, lookup in keystore, wrap in BST according</em>
-<a name="275" href="#275">275</a>         <em class="jxr_comment">// to specification</em>
-<a name="276" href="#276">276</a>         <em class="jxr_comment">//</em>
-<a name="277" href="#277">277</a>         <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsX509Data() || secRef.containsX509IssuerSerial()) {
-<a name="278" href="#278">278</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="279" href="#279">279</a>                 log.debug(<span class="jxr_string">"STR: IssuerSerial"</span>);
-<a name="280" href="#280">280</a>             }
-<a name="281" href="#281">281</a>             X509Certificate cert = <strong class="jxr_keyword">null</strong>;
-<a name="282" href="#282">282</a>             X509Certificate[] certs = 
-<a name="283" href="#283">283</a>                 secRef.getX509IssuerSerial(wsDocInfo.getCrypto());
-<a name="284" href="#284">284</a>             <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length == 0 || certs[0] == <strong class="jxr_keyword">null</strong>) {
-<a name="285" href="#285">285</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_CHECK);
-<a name="286" href="#286">286</a>             }
-<a name="287" href="#287">287</a>             cert = certs[0];
-<a name="288" href="#288">288</a>             tokElement = createBSTX509(doc, cert, secRef.getElement());
-<a name="289" href="#289">289</a>         }
-<a name="290" href="#290">290</a>         <em class="jxr_comment">//</em>
-<a name="291" href="#291">291</a>         <em class="jxr_comment">// third case: KeyIdentifier, must be SKI, lookup in keystore, wrap in</em>
-<a name="292" href="#292">292</a>         <em class="jxr_comment">// BST according to specification. No other KeyIdentifier type handled</em>
-<a name="293" href="#293">293</a>         <em class="jxr_comment">// here - just SKI</em>
-<a name="294" href="#294">294</a>         <em class="jxr_comment">//</em>
-<a name="295" href="#295">295</a>         <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) {
-<a name="296" href="#296">296</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="297" href="#297">297</a>                 log.debug(<span class="jxr_string">"STR: KeyIdentifier"</span>);
-<a name="298" href="#298">298</a>             }
-<a name="299" href="#299">299</a>             X509Certificate cert = <strong class="jxr_keyword">null</strong>;
-<a name="300" href="#300">300</a>             X509Certificate[] certs = secRef.getKeyIdentifier(wsDocInfo.getCrypto());
-<a name="301" href="#301">301</a>             <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length == 0 || certs[0] == <strong class="jxr_keyword">null</strong>) {
-<a name="302" href="#302">302</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_CHECK);
-<a name="303" href="#303">303</a>             }
-<a name="304" href="#304">304</a>             cert = certs[0];
-<a name="305" href="#305">305</a>             tokElement = createBSTX509(doc, cert, secRef.getElement());
-<a name="306" href="#306">306</a>         }
-<a name="307" href="#307">307</a>         <strong class="jxr_keyword">return</strong> (Element) tokElement;
-<a name="308" href="#308">308</a>     }
-<a name="309" href="#309">309</a> 
-<a name="310" href="#310">310</a>     <strong class="jxr_keyword">private</strong> Element createBSTX509(Document doc, X509Certificate cert, Element secRefE) 
-<a name="311" href="#311">311</a>         <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="312" href="#312">312</a>         byte data[];
-<a name="313" href="#313">313</a>         <strong class="jxr_keyword">try</strong> {
-<a name="314" href="#314">314</a>             data = cert.getEncoded();
-<a name="315" href="#315">315</a>         } <strong class="jxr_keyword">catch</strong> (CertificateEncodingException e) {
-<a name="316" href="#316">316</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="317" href="#317">317</a>                 WSSecurityException.SECURITY_TOKEN_UNAVAILABLE, <span class="jxr_string">"encodeError"</span>, <strong class="jxr_keyword">null</strong>, e
-<a name="318" href="#318">318</a>             );
-<a name="319" href="#319">319</a>         }
-<a name="320" href="#320">320</a>         String prefix = WSSecurityUtil.getPrefixNS(WSConstants.WSSE_NS, secRefE);
-<a name="321" href="#321">321</a>         Element elem = doc.createElementNS(WSConstants.WSSE_NS, prefix + <span class="jxr_string">":BinarySecurityToken"</span>);
-<a name="322" href="#322">322</a>         WSSecurityUtil.setNamespace(elem, WSConstants.WSSE_NS, prefix);
-<a name="323" href="#323">323</a>         <em class="jxr_comment">// elem.setAttributeNS(WSConstants.XMLNS_NS, "xmlns", "");</em>
-<a name="324" href="#324">324</a>         elem.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"ValueType"</span>, X509Security.X509_V3_TYPE);
-<a name="325" href="#325">325</a>         Text certText = doc.createTextNode(Base64.encode(data)); <em class="jxr_comment">// no line wrap</em>
-<a name="326" href="#326">326</a>         elem.appendChild(certText);
-<a name="327" href="#327">327</a>         <strong class="jxr_keyword">return</strong> elem;
-<a name="328" href="#328">328</a>     }
-<a name="329" href="#329">329</a>     
-<a name="330" href="#330">330</a> }
+<a name="109" href="#109">109</a>             <em class="jxr_comment">// Get the main document, that is the complete SOAP request document</em>
+<a name="110" href="#110">110</a>             <em class="jxr_comment">//</em>
+<a name="111" href="#111">111</a>             Document thisDoc = transformObject.getDocument();
+<a name="112" href="#112">112</a> 
+<a name="113" href="#113">113</a>             <em class="jxr_comment">//</em>
+<a name="114" href="#114">114</a>             <em class="jxr_comment">// Here we get some information about the document that is being</em>
+<a name="115" href="#115">115</a>             <em class="jxr_comment">// processed, in particular the crypto implementation, and already</em>
+<a name="116" href="#116">116</a>             <em class="jxr_comment">// detected BST that may be used later during dereferencing.</em>
+<a name="117" href="#117">117</a>             <em class="jxr_comment">//</em>
+<a name="118" href="#118">118</a>             wsDocInfo = WSDocInfoStore.lookup(thisDoc);
+<a name="119" href="#119">119</a>             <strong class="jxr_keyword">if</strong> (wsDocInfo == <strong class="jxr_keyword">null</strong>) {
+<a name="120" href="#120">120</a>                 <strong class="jxr_keyword">throw</strong> (<strong class="jxr_keyword">new</strong> CanonicalizationException(<span class="jxr_string">"no WSDocInfo found"</span>));
+<a name="121" href="#121">121</a>             }
+<a name="122" href="#122">122</a>             <em class="jxr_comment">//</em>
+<a name="123" href="#123">123</a>             <em class="jxr_comment">// According to the OASIS WS Specification "Web Services Security:</em>
+<a name="124" href="#124">124</a>             <em class="jxr_comment">// SOAP Message Security 1.0" Monday, 19 January 2004, chapter 8.3</em>
+<a name="125" href="#125">125</a>             <em class="jxr_comment">// describes that the input node set must be processed by the c14n</em>
+<a name="126" href="#126">126</a>             <em class="jxr_comment">// that is specified in the argument element of the STRTransform</em>
+<a name="127" href="#127">127</a>             <em class="jxr_comment">// element.</em>
+<a name="128" href="#128">128</a>             <em class="jxr_comment">// </em>
+<a name="129" href="#129">129</a>             <em class="jxr_comment">// First step: Get the required c14n argument and get the specified</em>
+<a name="130" href="#130">130</a>             <em class="jxr_comment">// Canonicalizer</em>
+<a name="131" href="#131">131</a>             <em class="jxr_comment">//</em>
+<a name="132" href="#132">132</a>             String canonAlgo = <strong class="jxr_keyword">null</strong>;
+<a name="133" href="#133">133</a>             <strong class="jxr_keyword">if</strong> (transformObject.length(
+<a name="134" href="#134">134</a>                 WSConstants.WSSE_NS, <span class="jxr_string">"TransformationParameters"</span>) == 1) {
+<a name="135" href="#135">135</a>                 Element tmpE = 
+<a name="136" href="#136">136</a>                     XMLUtils.selectNode(
+<a name="137" href="#137">137</a>                         transformObject.getElement().getFirstChild(), 
+<a name="138" href="#138">138</a>                         WSConstants.WSSE_NS,
+<a name="139" href="#139">139</a>                         <span class="jxr_string">"TransformationParameters"</span>, 
+<a name="140" href="#140">140</a>                         0
+<a name="141" href="#141">141</a>                     );
+<a name="142" href="#142">142</a>                 Element canonElem = 
+<a name="143" href="#143">143</a>                     (Element) WSSecurityUtil.getDirectChild(
+<a name="144" href="#144">144</a>                         tmpE, <span class="jxr_string">"CanonicalizationMethod"</span>, WSConstants.SIG_NS
+<a name="145" href="#145">145</a>                     );
+<a name="146" href="#146">146</a>                 canonAlgo = canonElem.getAttribute(<span class="jxr_string">"Algorithm"</span>);
+<a name="147" href="#147">147</a>                 <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="148" href="#148">148</a>                     log.debug(<span class="jxr_string">"CanonAlgo: "</span> + canonAlgo);
+<a name="149" href="#149">149</a>                 }
+<a name="150" href="#150">150</a>             }
+<a name="151" href="#151">151</a>             Canonicalizer canon = Canonicalizer.getInstance(canonAlgo);
+<a name="152" href="#152">152</a> 
+<a name="153" href="#153">153</a>             ByteArrayOutputStream bos = <strong class="jxr_keyword">null</strong>;
+<a name="154" href="#154">154</a>             byte[] buf = <strong class="jxr_keyword">null</strong>;
+<a name="155" href="#155">155</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="156" href="#156">156</a>                 buf = input.getBytes();
+<a name="157" href="#157">157</a>                 bos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream(buf.length);
+<a name="158" href="#158">158</a>                 bos.write(buf, 0, buf.length);
+<a name="159" href="#159">159</a>                 log.debug(<span class="jxr_string">"canon bos: "</span> + bos.toString());
+<a name="160" href="#160">160</a>             }
+<a name="161" href="#161">161</a> 
+<a name="162" href="#162">162</a>             <em class="jxr_comment">//</em>
+<a name="163" href="#163">163</a>             <em class="jxr_comment">// Get the input (node) to transform. Currently we support only an</em>
+<a name="164" href="#164">164</a>             <em class="jxr_comment">// Element as input format. If other formats are required we must</em>
+<a name="165" href="#165">165</a>             <em class="jxr_comment">// get it as bytes and probably reparse it into a DOM tree (How to</em>
+<a name="166" href="#166">166</a>             <em class="jxr_comment">// work with nodesets? how to select the right node from a nodeset?)</em>
+<a name="167" href="#167">167</a>             <em class="jxr_comment">//</em>
+<a name="168" href="#168">168</a>             Element str = <strong class="jxr_keyword">null</strong>;
+<a name="169" href="#169">169</a>             <strong class="jxr_keyword">if</strong> (input.isElement()) {
+<a name="170" href="#170">170</a>                 str = (Element) input.getSubNode();
+<a name="171" href="#171">171</a>             } <strong class="jxr_keyword">else</strong> {
+<a name="172" href="#172">172</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> CanonicalizationException(
+<a name="173" href="#173">173</a>                     <span class="jxr_string">"Wrong input format - only element input supported"</span>
+<a name="174" href="#174">174</a>                 );
+<a name="175" href="#175">175</a>             }
+<a name="176" href="#176">176</a> 
+<a name="177" href="#177">177</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="178" href="#178">178</a>                 log.debug(<span class="jxr_string">"STR: "</span> + str.toString());
+<a name="179" href="#179">179</a>             }
+<a name="180" href="#180">180</a>             <em class="jxr_comment">//</em>
+<a name="181" href="#181">181</a>             <em class="jxr_comment">// The element to transform MUST be a SecurityTokenReference</em>
+<a name="182" href="#182">182</a>             <em class="jxr_comment">// element.</em>
+<a name="183" href="#183">183</a>             <em class="jxr_comment">//</em>
+<a name="184" href="#184">184</a>             <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(str);
+<a name="185" href="#185">185</a>             <em class="jxr_comment">//</em>
+<a name="186" href="#186">186</a>             <em class="jxr_comment">// Third and forth step are performed by derefenceSTR()</em>
+<a name="187" href="#187">187</a>             <em class="jxr_comment">//</em>
+<a name="188" href="#188">188</a>             Element dereferencedToken = dereferenceSTR(thisDoc, secRef);
+<a name="189" href="#189">189</a>             <em class="jxr_comment">//</em>
+<a name="190" href="#190">190</a>             <em class="jxr_comment">// C14n with specified algorithm. According to WSS Specification.</em>
+<a name="191" href="#191">191</a>             <em class="jxr_comment">//</em>
+<a name="192" href="#192">192</a>             buf = canon.canonicalizeSubtree(dereferencedToken, <span class="jxr_string">"#default"</span>);
+<a name="193" href="#193">193</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="194" href="#194">194</a>                 bos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream(buf.length);
+<a name="195" href="#195">195</a>                 bos.write(buf, 0, buf.length);
+<a name="196" href="#196">196</a>                 log.debug(<span class="jxr_string">"after c14n: "</span> + bos.toString());
+<a name="197" href="#197">197</a>             }
+<a name="198" href="#198">198</a> 
+<a name="199" href="#199">199</a>             <em class="jxr_comment">//</em>
+<a name="200" href="#200">200</a>             <em class="jxr_comment">// Alert: Hacks ahead According to WSS spec an Apex node must</em>
+<a name="201" href="#201">201</a>             <em class="jxr_comment">// contain a default namespace. If none is availabe in the first</em>
+<a name="202" href="#202">202</a>             <em class="jxr_comment">// node of the c14n output (this is the apex element) then we do</em>
+<a name="203" href="#203">203</a>             <em class="jxr_comment">// some editing to insert an empty default namespace</em>
+<a name="204" href="#204">204</a>             <em class="jxr_comment">// </em>
+<a name="205" href="#205">205</a>             <em class="jxr_comment">// TODO: Rework theses hacks after c14n was updated and can be</em>
+<a name="206" href="#206">206</a>             <em class="jxr_comment">// instructed to insert empty default namespace if required</em>
+<a name="207" href="#207">207</a>             <em class="jxr_comment">//</em>
+<a name="208" href="#208">208</a>             <em class="jxr_comment">// If the problem with c14n method is solved then just do:</em>
+<a name="209" href="#209">209</a>             <em class="jxr_comment">// return new XMLSignatureInput(buf);</em>
+<a name="210" href="#210">210</a>             
+<a name="211" href="#211">211</a>             <em class="jxr_comment">// start of HACK</em>
+<a name="212" href="#212">212</a>             StringBuffer bf = <strong class="jxr_keyword">new</strong> StringBuffer(<strong class="jxr_keyword">new</strong> String(buf));
+<a name="213" href="#213">213</a>             String bf1 = bf.toString();
+<a name="214" href="#214">214</a> 
+<a name="215" href="#215">215</a>             <em class="jxr_comment">//</em>
+<a name="216" href="#216">216</a>             <em class="jxr_comment">// Find start and end of first element &lt;....&gt;, this is the Apex node</em>
+<a name="217" href="#217">217</a>             <em class="jxr_comment">//</em>
+<a name="218" href="#218">218</a>             <strong class="jxr_keyword">int</strong> gt = bf1.indexOf(<span class="jxr_string">"&gt;"</span>);
+<a name="219" href="#219">219</a>             <em class="jxr_comment">//</em>
+<a name="220" href="#220">220</a>             <em class="jxr_comment">// Lookup the default namespace</em>
+<a name="221" href="#221">221</a>             <em class="jxr_comment">//</em>
+<a name="222" href="#222">222</a>             <strong class="jxr_keyword">int</strong> idx = bf1.indexOf(XMLNS);
+<a name="223" href="#223">223</a>             <em class="jxr_comment">//</em>
+<a name="224" href="#224">224</a>             <em class="jxr_comment">// If none found or if it is outside of this (Apex) element look for</em>
+<a name="225" href="#225">225</a>             <em class="jxr_comment">// first blank in, insert default namespace there (this is the</em>
+<a name="226" href="#226">226</a>             <em class="jxr_comment">// correct place according to c14n specification)</em>
+<a name="227" href="#227">227</a>             <em class="jxr_comment">//</em>
+<a name="228" href="#228">228</a>             <strong class="jxr_keyword">if</strong> (idx &lt; 0 || idx &gt; gt) {
+<a name="229" href="#229">229</a>                 idx = bf1.indexOf(<span class="jxr_string">" "</span>);
+<a name="230" href="#230">230</a>                 bf.insert(idx + 1, <span class="jxr_string">"xmlns=\&quot;\&quot; "</span>);
+<a name="231" href="#231">231</a>                 bf1 = bf.toString();
+<a name="232" href="#232">232</a>             }
+<a name="233" href="#233">233</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="234" href="#234">234</a>                 log.debug(<span class="jxr_string">"last result: "</span>);
+<a name="235" href="#235">235</a>                 log.debug(bf1);
+<a name="236" href="#236">236</a>             }
+<a name="237" href="#237">237</a>             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> XMLSignatureInput(bf1.getBytes());
+<a name="238" href="#238">238</a>         }
+<a name="239" href="#239">239</a>         <em class="jxr_comment">// End of HACK</em>
+<a name="240" href="#240">240</a>         <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) {
+<a name="241" href="#241">241</a>             <strong class="jxr_keyword">throw</strong> (<strong class="jxr_keyword">new</strong> CanonicalizationException(<span class="jxr_string">"WS Security Exception"</span>, ex));
+<a name="242" href="#242">242</a>         }
+<a name="243" href="#243">243</a>     }
+<a name="244" href="#244">244</a> 
+<a name="245" href="#245">245</a>     <strong class="jxr_keyword">private</strong> Element dereferenceSTR(Document doc, <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef)
+<a name="246" href="#246">246</a>         <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="247" href="#247">247</a>         <em class="jxr_comment">//</em>
+<a name="248" href="#248">248</a>         <em class="jxr_comment">// Third step: locate the security token referenced by the STR element.</em>
+<a name="249" href="#249">249</a>         <em class="jxr_comment">// Either the Token is contained in the document as a</em>
+<a name="250" href="#250">250</a>         <em class="jxr_comment">// BinarySecurityToken or stored in some key storage.</em>
+<a name="251" href="#251">251</a>         <em class="jxr_comment">// </em>
+<a name="252" href="#252">252</a>         <em class="jxr_comment">// Fourth step: after security token was located, prepare it. If its</em>
+<a name="253" href="#253">253</a>         <em class="jxr_comment">// reference via a direct reference, i.e. a relative URI that references</em>
+<a name="254" href="#254">254</a>         <em class="jxr_comment">// the BST directly in the message then just return that element.</em>
+<a name="255" href="#255">255</a>         <em class="jxr_comment">// Otherwise wrap the located token in a newly created BST element as</em>
+<a name="256" href="#256">256</a>         <em class="jxr_comment">// described in WSS Specification.</em>
+<a name="257" href="#257">257</a>         <em class="jxr_comment">// </em>
+<a name="258" href="#258">258</a>         <em class="jxr_comment">//</em>
+<a name="259" href="#259">259</a>         Element tokElement = <strong class="jxr_keyword">null</strong>;
+<a name="260" href="#260">260</a> 
+<a name="261" href="#261">261</a>         <em class="jxr_comment">//</em>
+<a name="262" href="#262">262</a>         <em class="jxr_comment">// First case: direct reference, according to chap 7.2 of OASIS WS</em>
+<a name="263" href="#263">263</a>         <em class="jxr_comment">// specification (main document). Only in this case return a true</em>
+<a name="264" href="#264">264</a>         <em class="jxr_comment">// reference to the BST. Copying is done by the caller.</em>
+<a name="265" href="#265">265</a>         <em class="jxr_comment">//</em>
+<a name="266" href="#266">266</a>         <strong class="jxr_keyword">if</strong> (secRef.containsReference()) {
+<a name="267" href="#267">267</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="268" href="#268">268</a>                 log.debug(<span class="jxr_string">"STR: Reference"</span>);
+<a name="269" href="#269">269</a>             }
+<a name="270" href="#270">270</a>             tokElement = secRef.getTokenElement(doc, wsDocInfo, <strong class="jxr_keyword">null</strong>);
+<a name="271" href="#271">271</a>         }
+<a name="272" href="#272">272</a>         <em class="jxr_comment">//</em>
+<a name="273" href="#273">273</a>         <em class="jxr_comment">// second case: IssuerSerial, lookup in keystore, wrap in BST according</em>
+<a name="274" href="#274">274</a>         <em class="jxr_comment">// to specification</em>
+<a name="275" href="#275">275</a>         <em class="jxr_comment">//</em>
+<a name="276" href="#276">276</a>         <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsX509Data() || secRef.containsX509IssuerSerial()) {
+<a name="277" href="#277">277</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="278" href="#278">278</a>                 log.debug(<span class="jxr_string">"STR: IssuerSerial"</span>);
+<a name="279" href="#279">279</a>             }
+<a name="280" href="#280">280</a>             X509Certificate cert = <strong class="jxr_keyword">null</strong>;
+<a name="281" href="#281">281</a>             X509Certificate[] certs = 
+<a name="282" href="#282">282</a>                 secRef.getX509IssuerSerial(wsDocInfo.getCrypto());
+<a name="283" href="#283">283</a>             <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length == 0 || certs[0] == <strong class="jxr_keyword">null</strong>) {
+<a name="284" href="#284">284</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_CHECK);
+<a name="285" href="#285">285</a>             }
+<a name="286" href="#286">286</a>             cert = certs[0];
+<a name="287" href="#287">287</a>             tokElement = createBSTX509(doc, cert, secRef.getElement());
+<a name="288" href="#288">288</a>         }
+<a name="289" href="#289">289</a>         <em class="jxr_comment">//</em>
+<a name="290" href="#290">290</a>         <em class="jxr_comment">// third case: KeyIdentifier. For SKI, lookup in keystore, wrap in</em>
+<a name="291" href="#291">291</a>         <em class="jxr_comment">// BST according to specification. Otherwise if it's a wsse:KeyIdentifier it could</em>
+<a name="292" href="#292">292</a>         <em class="jxr_comment">// be a SAML assertion, so try and find the referenced element.</em>
+<a name="293" href="#293">293</a>         <em class="jxr_comment">//</em>
+<a name="294" href="#294">294</a>         <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) {
+<a name="295" href="#295">295</a>             <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="296" href="#296">296</a>                 log.debug(<span class="jxr_string">"STR: KeyIdentifier"</span>);
+<a name="297" href="#297">297</a>             }
+<a name="298" href="#298">298</a>             <strong class="jxr_keyword">if</strong> (WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(secRef.getKeyIdentifierValueType())) {
+<a name="299" href="#299">299</a>                 tokElement = secRef.getKeyIdentifierTokenElement(doc, wsDocInfo, <strong class="jxr_keyword">null</strong>);
+<a name="300" href="#300">300</a>             } <strong class="jxr_keyword">else</strong> {
+<a name="301" href="#301">301</a>                 X509Certificate cert = <strong class="jxr_keyword">null</strong>;
+<a name="302" href="#302">302</a>                 X509Certificate[] certs = secRef.getKeyIdentifier(wsDocInfo.getCrypto());
+<a name="303" href="#303">303</a>                 <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length == 0 || certs[0] == <strong class="jxr_keyword">null</strong>) {
+<a name="304" href="#304">304</a>                     <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_CHECK);
+<a name="305" href="#305">305</a>                 }
+<a name="306" href="#306">306</a>                 cert = certs[0];
+<a name="307" href="#307">307</a>                 tokElement = createBSTX509(doc, cert, secRef.getElement());
+<a name="308" href="#308">308</a>             }
+<a name="309" href="#309">309</a>         }
+<a name="310" href="#310">310</a>         <strong class="jxr_keyword">return</strong> tokElement;
+<a name="311" href="#311">311</a>     }
+<a name="312" href="#312">312</a> 
+<a name="313" href="#313">313</a>     <strong class="jxr_keyword">private</strong> Element createBSTX509(Document doc, X509Certificate cert, Element secRefE) 
+<a name="314" href="#314">314</a>         <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="315" href="#315">315</a>         byte data[];
+<a name="316" href="#316">316</a>         <strong class="jxr_keyword">try</strong> {
+<a name="317" href="#317">317</a>             data = cert.getEncoded();
+<a name="318" href="#318">318</a>         } <strong class="jxr_keyword">catch</strong> (CertificateEncodingException e) {
+<a name="319" href="#319">319</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="320" href="#320">320</a>                 WSSecurityException.SECURITY_TOKEN_UNAVAILABLE, <span class="jxr_string">"encodeError"</span>, <strong class="jxr_keyword">null</strong>, e
+<a name="321" href="#321">321</a>             );
+<a name="322" href="#322">322</a>         }
+<a name="323" href="#323">323</a>         String prefix = WSSecurityUtil.getPrefixNS(WSConstants.WSSE_NS, secRefE);
+<a name="324" href="#324">324</a>         Element elem = doc.createElementNS(WSConstants.WSSE_NS, prefix + <span class="jxr_string">":BinarySecurityToken"</span>);
+<a name="325" href="#325">325</a>         WSSecurityUtil.setNamespace(elem, WSConstants.WSSE_NS, prefix);
+<a name="326" href="#326">326</a>         <em class="jxr_comment">// elem.setAttributeNS(WSConstants.XMLNS_NS, "xmlns", "");</em>
+<a name="327" href="#327">327</a>         elem.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"ValueType"</span>, X509Security.X509_V3_TYPE);
+<a name="328" href="#328">328</a>         Text certText = doc.createTextNode(Base64.encode(data)); <em class="jxr_comment">// no line wrap</em>
+<a name="329" href="#329">329</a>         elem.appendChild(certText);
+<a name="330" href="#330">330</a>         <strong class="jxr_keyword">return</strong> elem;
+<a name="331" href="#331">331</a>     }
+<a name="332" href="#332">332</a>     
+<a name="333" href="#333">333</a> }
 </pre>
 <hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
 </html>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/transform/package-frame.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/transform/package-frame.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/transform/package-frame.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/transform/package-frame.html Mon Apr 20 13:56:25 2009
@@ -3,7 +3,7 @@
 <html xml:lang="en" lang="en">
 	<head>
 		<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
-		<title>WSS4J 1.5.6 Reference Package org.apache.ws.security.transform</title>
+		<title>WSS4J 1.5.7 Reference Package org.apache.ws.security.transform</title>
 		<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="style" />
 	</head>
 	<body>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/transform/package-summary.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/transform/package-summary.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/transform/package-summary.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/transform/package-summary.html Mon Apr 20 13:56:25 2009
@@ -3,7 +3,7 @@
 <html xml:lang="en" lang="en">
 	<head>
 		<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
-		<title>WSS4J 1.5.6 Reference Package org.apache.ws.security.transform</title>
+		<title>WSS4J 1.5.7 Reference Package org.apache.ws.security.transform</title>
 		<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="style" />
 	</head>
 	<body>



---------------------------------------------------------------------
To unsubscribe, e-mail: wss4j-dev-unsubscribe@ws.apache.org
For additional commands, e-mail: wss4j-dev-help@ws.apache.org