You are viewing a plain text version of this content. The canonical link for it is here.
Posted to wss4j-dev@ws.apache.org by co...@apache.org on 2009/04/20 15:56:38 UTC
svn commit: r766696 [33/36] - in /webservices/wss4j/site: ./ apidocs/
apidocs/org/apache/ws/axis/security/
apidocs/org/apache/ws/axis/security/class-use/
apidocs/org/apache/ws/axis/security/handler/
apidocs/org/apache/ws/axis/security/handler/class-use...
Modified: webservices/wss4j/site/xref/org/apache/ws/security/saml/WSSignSAMLEnvelope.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/saml/WSSignSAMLEnvelope.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/saml/WSSignSAMLEnvelope.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/saml/WSSignSAMLEnvelope.html Mon Apr 20 13:56:25 2009
@@ -167,7 +167,7 @@
<a name="157" href="#157">157</a> <em class="jxr_comment"> * Gather some info about the document to process and store it for</em>
<a name="158" href="#158">158</a> <em class="jxr_comment"> * retrieval</em>
<a name="159" href="#159">159</a> <em class="jxr_comment"> */</em>
-<a name="160" href="#160">160</a> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a>(doc.hashCode());
+<a name="160" href="#160">160</a> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a>(doc);
<a name="161" href="#161">161</a>
<a name="162" href="#162">162</a> Element envelope = doc.getDocumentElement();
<a name="163" href="#163">163</a> <a href="../../../../../org/apache/ws/security/SOAPConstants.html">SOAPConstants</a> soapConstants = WSSecurityUtil.getSOAPConstants(envelope);
@@ -253,14 +253,14 @@
<a name="243" href="#243">243</a> }
<a name="244" href="#244">244</a>
<a name="245" href="#245">245</a> KeyInfo info = sig.getKeyInfo();
-<a name="246" href="#246">246</a> String keyInfoUri = <span class="jxr_string">"KeyId-"</span> + info.hashCode();
+<a name="246" href="#246">246</a> String keyInfoUri = wssConfig.getIdAllocator().createSecureId(<span class="jxr_string">"KeyId-"</span>, info);
<a name="247" href="#247">247</a> info.setId(keyInfoUri);
<a name="248" href="#248">248</a>
<a name="249" href="#249">249</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(doc);
-<a name="250" href="#250">250</a> String strUri = <span class="jxr_string">"STRId-"</span> + secRef.hashCode();
+<a name="250" href="#250">250</a> String strUri = wssConfig.getIdAllocator().createSecureId(<span class="jxr_string">"STRId-"</span>, secRef);
<a name="251" href="#251">251</a> secRef.setID(strUri);
<a name="252" href="#252">252</a>
-<a name="253" href="#253">253</a> String certUri = <span class="jxr_string">"CertId-"</span> + certs[0].hashCode();
+<a name="253" href="#253">253</a> String certUri = wssConfig.getIdAllocator().createSecureId(<span class="jxr_string">"CertId-"</span>, certs[0]);
<a name="254" href="#254">254</a>
<a name="255" href="#255">255</a> <strong class="jxr_keyword">if</strong> (tlog.isDebugEnabled()) {
<a name="256" href="#256">256</a> t1 = System.currentTimeMillis();
@@ -288,7 +288,7 @@
<a name="278" href="#278">278</a> <strong class="jxr_keyword">try</strong> {
<a name="279" href="#279">279</a> <strong class="jxr_keyword">if</strong> (senderVouches) {
<a name="280" href="#280">280</a> secRefSaml = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(doc);
-<a name="281" href="#281">281</a> String strSamlUri = <span class="jxr_string">"STRSAMLId-"</span> + secRefSaml.hashCode();
+<a name="281" href="#281">281</a> String strSamlUri = wssConfig.getIdAllocator().createSecureId(<span class="jxr_string">"STRSAMLId-"</span>, secRefSaml);
<a name="282" href="#282">282</a> secRefSaml.setID(strSamlUri);
<a name="283" href="#283">283</a> <em class="jxr_comment">// Decouple Refernce/KeyInfo setup - quick shot here</em>
<a name="284" href="#284">284</a> <a href="../../../../../org/apache/ws/security/message/token/Reference.html">Reference</a> ref = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/Reference.html">Reference</a>(doc);
@@ -428,7 +428,7 @@
<a name="418" href="#418">418</a> wsDocInfo.setAssertion(samlToken);
<a name="419" href="#419">419</a> WSSecurityUtil.prependChildElement(securityHeader, samlToken);
<a name="420" href="#420">420</a>
-<a name="421" href="#421">421</a> WSDocInfoStore.store(wsDocInfo);
+<a name="421" href="#421">421</a> <strong class="jxr_keyword">boolean</strong> remove = WSDocInfoStore.store(wsDocInfo);
<a name="422" href="#422">422</a> <strong class="jxr_keyword">try</strong> {
<a name="423" href="#423">423</a> <strong class="jxr_keyword">if</strong> (senderVouches) {
<a name="424" href="#424">424</a> sig
@@ -445,21 +445,23 @@
<a name="435" href="#435">435</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_SIGNATURE,
<a name="436" href="#436">436</a> <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, e1);
<a name="437" href="#437">437</a> } <strong class="jxr_keyword">finally</strong> {
-<a name="438" href="#438">438</a> WSDocInfoStore.delete(wsDocInfo);
-<a name="439" href="#439">439</a> }
-<a name="440" href="#440">440</a> <strong class="jxr_keyword">if</strong> (tlog.isDebugEnabled()) {
-<a name="441" href="#441">441</a> t4 = System.currentTimeMillis();
-<a name="442" href="#442">442</a> tlog.debug(<span class="jxr_string">"SignEnvelope: cre-Sig= "</span> + (t1 - t0)
-<a name="443" href="#443">443</a> + <span class="jxr_string">" set transform= "</span> + (t2 - t1) + <span class="jxr_string">" sec-ref= "</span> + (t3 - t2)
-<a name="444" href="#444">444</a> + <span class="jxr_string">" signature= "</span> + (t4 - t3));
-<a name="445" href="#445">445</a> }
-<a name="446" href="#446">446</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="447" href="#447">447</a> log.debug(<span class="jxr_string">"Signing complete."</span>);
-<a name="448" href="#448">448</a> }
-<a name="449" href="#449">449</a> <strong class="jxr_keyword">return</strong> (doc);
-<a name="450" href="#450">450</a>
-<a name="451" href="#451">451</a> }
-<a name="452" href="#452">452</a> }
+<a name="438" href="#438">438</a> <strong class="jxr_keyword">if</strong> (remove) {
+<a name="439" href="#439">439</a> WSDocInfoStore.delete(wsDocInfo);
+<a name="440" href="#440">440</a> }
+<a name="441" href="#441">441</a> }
+<a name="442" href="#442">442</a> <strong class="jxr_keyword">if</strong> (tlog.isDebugEnabled()) {
+<a name="443" href="#443">443</a> t4 = System.currentTimeMillis();
+<a name="444" href="#444">444</a> tlog.debug(<span class="jxr_string">"SignEnvelope: cre-Sig= "</span> + (t1 - t0)
+<a name="445" href="#445">445</a> + <span class="jxr_string">" set transform= "</span> + (t2 - t1) + <span class="jxr_string">" sec-ref= "</span> + (t3 - t2)
+<a name="446" href="#446">446</a> + <span class="jxr_string">" signature= "</span> + (t4 - t3));
+<a name="447" href="#447">447</a> }
+<a name="448" href="#448">448</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="449" href="#449">449</a> log.debug(<span class="jxr_string">"Signing complete."</span>);
+<a name="450" href="#450">450</a> }
+<a name="451" href="#451">451</a> <strong class="jxr_keyword">return</strong> (doc);
+<a name="452" href="#452">452</a>
+<a name="453" href="#453">453</a> }
+<a name="454" href="#454">454</a> }
</pre>
<hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
</html>
Modified: webservices/wss4j/site/xref/org/apache/ws/security/saml/package-frame.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/saml/package-frame.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/saml/package-frame.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/saml/package-frame.html Mon Apr 20 13:56:25 2009
@@ -3,7 +3,7 @@
<html xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
- <title>WSS4J 1.5.6 Reference Package org.apache.ws.security.saml</title>
+ <title>WSS4J 1.5.7 Reference Package org.apache.ws.security.saml</title>
<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="style" />
</head>
<body>
Modified: webservices/wss4j/site/xref/org/apache/ws/security/saml/package-summary.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/saml/package-summary.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/saml/package-summary.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/saml/package-summary.html Mon Apr 20 13:56:25 2009
@@ -3,7 +3,7 @@
<html xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
- <title>WSS4J 1.5.6 Reference Package org.apache.ws.security.saml</title>
+ <title>WSS4J 1.5.7 Reference Package org.apache.ws.security.saml</title>
<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="style" />
</head>
<body>
Modified: webservices/wss4j/site/xref/org/apache/ws/security/transform/STRTransform.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/transform/STRTransform.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/transform/STRTransform.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/transform/STRTransform.html Mon Apr 20 13:56:25 2009
@@ -40,304 +40,307 @@
<a name="30" href="#30">30</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.c14n.Canonicalizer;
<a name="31" href="#31">31</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.c14n.InvalidCanonicalizerException;
<a name="32" href="#32">32</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.signature.XMLSignatureInput;
-<a name="33" href="#33">33</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.transforms.TransformSpi;
-<a name="34" href="#34">34</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.Base64;
-<a name="35" href="#35">35</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.utils.XMLUtils;
-<a name="36" href="#36">36</a>
-<a name="37" href="#37">37</a> <strong class="jxr_keyword">import</strong> org.w3c.dom.Document;
-<a name="38" href="#38">38</a> <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
-<a name="39" href="#39">39</a> <strong class="jxr_keyword">import</strong> org.w3c.dom.Text;
-<a name="40" href="#40">40</a>
-<a name="41" href="#41">41</a> <strong class="jxr_keyword">import</strong> java.io.ByteArrayOutputStream;
-<a name="42" href="#42">42</a> <strong class="jxr_keyword">import</strong> java.io.IOException;
-<a name="43" href="#43">43</a> <strong class="jxr_keyword">import</strong> java.security.cert.CertificateEncodingException;
-<a name="44" href="#44">44</a> <strong class="jxr_keyword">import</strong> java.security.cert.X509Certificate;
-<a name="45" href="#45">45</a>
-<a name="46" href="#46">46</a> <em class="jxr_javadoccomment">/**</em>
-<a name="47" href="#47">47</a> <em class="jxr_javadoccomment"> * Class STRTransform</em>
-<a name="48" href="#48">48</a> <em class="jxr_javadoccomment"> * </em>
-<a name="49" href="#49">49</a> <em class="jxr_javadoccomment"> * @author Werner Dittmann (Werner.Dittmann@siemens.com)</em>
-<a name="50" href="#50">50</a> <em class="jxr_javadoccomment"> * @version 1.0</em>
-<a name="51" href="#51">51</a> <em class="jxr_javadoccomment"> */</em>
-<a name="52" href="#52">52</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/transform/STRTransform.html">STRTransform</a> <strong class="jxr_keyword">extends</strong> TransformSpi {
-<a name="53" href="#53">53</a>
-<a name="54" href="#54">54</a> <em class="jxr_javadoccomment">/**</em>
-<a name="55" href="#55">55</a> <em class="jxr_javadoccomment"> * Field implementedTransformURI</em>
-<a name="56" href="#56">56</a> <em class="jxr_javadoccomment"> */</em>
-<a name="57" href="#57">57</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> String implementedTransformURI = <span class="jxr_string">"http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#STR-Transform"</span>;
-<a name="58" href="#58">58</a>
-<a name="59" href="#59">59</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> Log log = LogFactory.getLog(STRTransform.<strong class="jxr_keyword">class</strong>.getName());
-<a name="60" href="#60">60</a>
-<a name="61" href="#61">61</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">boolean</strong> doDebug = false;
-<a name="62" href="#62">62</a>
-<a name="63" href="#63">63</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> String XMLNS = <span class="jxr_string">"xmlns="</span>;
-<a name="64" href="#64">64</a>
-<a name="65" href="#65">65</a> <strong class="jxr_keyword">private</strong> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo = <strong class="jxr_keyword">null</strong>;
-<a name="66" href="#66">66</a>
-<a name="67" href="#67">67</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> wantsOctetStream() {
-<a name="68" href="#68">68</a> <strong class="jxr_keyword">return</strong> false;
-<a name="69" href="#69">69</a> }
-<a name="70" href="#70">70</a>
-<a name="71" href="#71">71</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> wantsNodeSet() {
-<a name="72" href="#72">72</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">true</strong>;
-<a name="73" href="#73">73</a> }
-<a name="74" href="#74">74</a>
-<a name="75" href="#75">75</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> returnsOctetStream() {
-<a name="76" href="#76">76</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">true</strong>;
-<a name="77" href="#77">77</a> }
-<a name="78" href="#78">78</a>
-<a name="79" href="#79">79</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> returnsNodeSet() {
-<a name="80" href="#80">80</a> <strong class="jxr_keyword">return</strong> false;
-<a name="81" href="#81">81</a> }
-<a name="82" href="#82">82</a>
-<a name="83" href="#83">83</a> <em class="jxr_javadoccomment">/**</em>
-<a name="84" href="#84">84</a> <em class="jxr_javadoccomment"> * Method engineGetURI</em>
-<a name="85" href="#85">85</a> <em class="jxr_javadoccomment"> */</em>
-<a name="86" href="#86">86</a> <strong class="jxr_keyword">protected</strong> String engineGetURI() {
-<a name="87" href="#87">87</a> <strong class="jxr_keyword">return</strong> STRTransform.implementedTransformURI;
-<a name="88" href="#88">88</a> }
-<a name="89" href="#89">89</a>
-<a name="90" href="#90">90</a> <em class="jxr_javadoccomment">/**</em>
-<a name="91" href="#91">91</a> <em class="jxr_javadoccomment"> * Method enginePerformTransform</em>
-<a name="92" href="#92">92</a> <em class="jxr_javadoccomment"> * </em>
-<a name="93" href="#93">93</a> <em class="jxr_javadoccomment"> * @param input</em>
-<a name="94" href="#94">94</a> <em class="jxr_javadoccomment"> * @throws CanonicalizationException</em>
-<a name="95" href="#95">95</a> <em class="jxr_javadoccomment"> * @throws InvalidCanonicalizerException</em>
-<a name="96" href="#96">96</a> <em class="jxr_javadoccomment"> */</em>
-<a name="97" href="#97">97</a> <strong class="jxr_keyword">protected</strong> XMLSignatureInput enginePerformTransform(XMLSignatureInput input)
-<a name="98" href="#98">98</a> <strong class="jxr_keyword">throws</strong> IOException, CanonicalizationException, InvalidCanonicalizerException {
-<a name="99" href="#99">99</a> doDebug = log.isDebugEnabled();
-<a name="100" href="#100">100</a>
-<a name="101" href="#101">101</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="102" href="#102">102</a> log.debug(<span class="jxr_string">"Beginning STRTransform..."</span> + input.toString());
-<a name="103" href="#103">103</a> }
-<a name="104" href="#104">104</a>
-<a name="105" href="#105">105</a> <strong class="jxr_keyword">try</strong> {
-<a name="106" href="#106">106</a> <em class="jxr_comment">//</em>
-<a name="107" href="#107">107</a> <em class="jxr_comment">// Get the main document, that is the complete SOAP request document</em>
+<a name="33" href="#33">33</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.transforms.Transform;
+<a name="34" href="#34">34</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.transforms.TransformSpi;
+<a name="35" href="#35">35</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.Base64;
+<a name="36" href="#36">36</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.utils.XMLUtils;
+<a name="37" href="#37">37</a>
+<a name="38" href="#38">38</a> <strong class="jxr_keyword">import</strong> org.w3c.dom.Document;
+<a name="39" href="#39">39</a> <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
+<a name="40" href="#40">40</a> <strong class="jxr_keyword">import</strong> org.w3c.dom.Text;
+<a name="41" href="#41">41</a>
+<a name="42" href="#42">42</a> <strong class="jxr_keyword">import</strong> java.io.ByteArrayOutputStream;
+<a name="43" href="#43">43</a> <strong class="jxr_keyword">import</strong> java.io.IOException;
+<a name="44" href="#44">44</a> <strong class="jxr_keyword">import</strong> java.security.cert.CertificateEncodingException;
+<a name="45" href="#45">45</a> <strong class="jxr_keyword">import</strong> java.security.cert.X509Certificate;
+<a name="46" href="#46">46</a>
+<a name="47" href="#47">47</a> <em class="jxr_javadoccomment">/**</em>
+<a name="48" href="#48">48</a> <em class="jxr_javadoccomment"> * Class STRTransform</em>
+<a name="49" href="#49">49</a> <em class="jxr_javadoccomment"> * </em>
+<a name="50" href="#50">50</a> <em class="jxr_javadoccomment"> * @author Werner Dittmann (Werner.Dittmann@siemens.com)</em>
+<a name="51" href="#51">51</a> <em class="jxr_javadoccomment"> * @version 1.0</em>
+<a name="52" href="#52">52</a> <em class="jxr_javadoccomment"> */</em>
+<a name="53" href="#53">53</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/transform/STRTransform.html">STRTransform</a> <strong class="jxr_keyword">extends</strong> TransformSpi {
+<a name="54" href="#54">54</a>
+<a name="55" href="#55">55</a> <em class="jxr_javadoccomment">/**</em>
+<a name="56" href="#56">56</a> <em class="jxr_javadoccomment"> * Field implementedTransformURI</em>
+<a name="57" href="#57">57</a> <em class="jxr_javadoccomment"> */</em>
+<a name="58" href="#58">58</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> String implementedTransformURI = <span class="jxr_string">"http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#STR-Transform"</span>;
+<a name="59" href="#59">59</a>
+<a name="60" href="#60">60</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> Log log = LogFactory.getLog(STRTransform.<strong class="jxr_keyword">class</strong>.getName());
+<a name="61" href="#61">61</a>
+<a name="62" href="#62">62</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">boolean</strong> doDebug = false;
+<a name="63" href="#63">63</a>
+<a name="64" href="#64">64</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> String XMLNS = <span class="jxr_string">"xmlns="</span>;
+<a name="65" href="#65">65</a>
+<a name="66" href="#66">66</a> <strong class="jxr_keyword">private</strong> <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo = <strong class="jxr_keyword">null</strong>;
+<a name="67" href="#67">67</a>
+<a name="68" href="#68">68</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> wantsOctetStream() {
+<a name="69" href="#69">69</a> <strong class="jxr_keyword">return</strong> false;
+<a name="70" href="#70">70</a> }
+<a name="71" href="#71">71</a>
+<a name="72" href="#72">72</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> wantsNodeSet() {
+<a name="73" href="#73">73</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">true</strong>;
+<a name="74" href="#74">74</a> }
+<a name="75" href="#75">75</a>
+<a name="76" href="#76">76</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> returnsOctetStream() {
+<a name="77" href="#77">77</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">true</strong>;
+<a name="78" href="#78">78</a> }
+<a name="79" href="#79">79</a>
+<a name="80" href="#80">80</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> returnsNodeSet() {
+<a name="81" href="#81">81</a> <strong class="jxr_keyword">return</strong> false;
+<a name="82" href="#82">82</a> }
+<a name="83" href="#83">83</a>
+<a name="84" href="#84">84</a> <em class="jxr_javadoccomment">/**</em>
+<a name="85" href="#85">85</a> <em class="jxr_javadoccomment"> * Method engineGetURI</em>
+<a name="86" href="#86">86</a> <em class="jxr_javadoccomment"> */</em>
+<a name="87" href="#87">87</a> <strong class="jxr_keyword">protected</strong> String engineGetURI() {
+<a name="88" href="#88">88</a> <strong class="jxr_keyword">return</strong> STRTransform.implementedTransformURI;
+<a name="89" href="#89">89</a> }
+<a name="90" href="#90">90</a>
+<a name="91" href="#91">91</a> <em class="jxr_javadoccomment">/**</em>
+<a name="92" href="#92">92</a> <em class="jxr_javadoccomment"> * Method enginePerformTransform</em>
+<a name="93" href="#93">93</a> <em class="jxr_javadoccomment"> * </em>
+<a name="94" href="#94">94</a> <em class="jxr_javadoccomment"> * @param input</em>
+<a name="95" href="#95">95</a> <em class="jxr_javadoccomment"> * @throws CanonicalizationException</em>
+<a name="96" href="#96">96</a> <em class="jxr_javadoccomment"> * @throws InvalidCanonicalizerException</em>
+<a name="97" href="#97">97</a> <em class="jxr_javadoccomment"> */</em>
+<a name="98" href="#98">98</a> <strong class="jxr_keyword">protected</strong> XMLSignatureInput enginePerformTransform(XMLSignatureInput input,
+<a name="99" href="#99">99</a> Transform transformObject)
+<a name="100" href="#100">100</a> <strong class="jxr_keyword">throws</strong> IOException, CanonicalizationException, InvalidCanonicalizerException {
+<a name="101" href="#101">101</a> doDebug = log.isDebugEnabled();
+<a name="102" href="#102">102</a>
+<a name="103" href="#103">103</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="104" href="#104">104</a> log.debug(<span class="jxr_string">"Beginning STRTransform..."</span> + input.toString());
+<a name="105" href="#105">105</a> }
+<a name="106" href="#106">106</a>
+<a name="107" href="#107">107</a> <strong class="jxr_keyword">try</strong> {
<a name="108" href="#108">108</a> <em class="jxr_comment">//</em>
-<a name="109" href="#109">109</a> Document thisDoc = <strong class="jxr_keyword">this</strong>._transformObject.getDocument();
-<a name="110" href="#110">110</a> <strong class="jxr_keyword">int</strong> docHash = thisDoc.hashCode();
-<a name="111" href="#111">111</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="112" href="#112">112</a> log.debug(<span class="jxr_string">"doc: "</span> + thisDoc.toString() + <span class="jxr_string">", "</span> + docHash);
-<a name="113" href="#113">113</a> }
-<a name="114" href="#114">114</a> <em class="jxr_comment">//</em>
-<a name="115" href="#115">115</a> <em class="jxr_comment">// Here we get some information about the document that is being</em>
-<a name="116" href="#116">116</a> <em class="jxr_comment">// processed, in particular the crypto implementation, and already</em>
-<a name="117" href="#117">117</a> <em class="jxr_comment">// detected BST that may be used later during dereferencing.</em>
-<a name="118" href="#118">118</a> <em class="jxr_comment">//</em>
-<a name="119" href="#119">119</a> wsDocInfo = WSDocInfoStore.lookup(docHash);
-<a name="120" href="#120">120</a> <strong class="jxr_keyword">if</strong> (wsDocInfo == <strong class="jxr_keyword">null</strong>) {
-<a name="121" href="#121">121</a> <strong class="jxr_keyword">throw</strong> (<strong class="jxr_keyword">new</strong> CanonicalizationException(<span class="jxr_string">"no WSDocInfo found"</span>));
-<a name="122" href="#122">122</a> }
-<a name="123" href="#123">123</a> <em class="jxr_comment">//</em>
-<a name="124" href="#124">124</a> <em class="jxr_comment">// According to the OASIS WS Specification "Web Services Security:</em>
-<a name="125" href="#125">125</a> <em class="jxr_comment">// SOAP Message Security 1.0" Monday, 19 January 2004, chapter 8.3</em>
-<a name="126" href="#126">126</a> <em class="jxr_comment">// describes that the input node set must be processed by the c14n</em>
-<a name="127" href="#127">127</a> <em class="jxr_comment">// that is specified in the argument element of the STRTransform</em>
-<a name="128" href="#128">128</a> <em class="jxr_comment">// element.</em>
-<a name="129" href="#129">129</a> <em class="jxr_comment">// </em>
-<a name="130" href="#130">130</a> <em class="jxr_comment">// First step: Get the required c14n argument and get the specified</em>
-<a name="131" href="#131">131</a> <em class="jxr_comment">// Canonicalizer</em>
-<a name="132" href="#132">132</a> <em class="jxr_comment">//</em>
-<a name="133" href="#133">133</a> String canonAlgo = <strong class="jxr_keyword">null</strong>;
-<a name="134" href="#134">134</a> <strong class="jxr_keyword">if</strong> (<strong class="jxr_keyword">this</strong>._transformObject.length(
-<a name="135" href="#135">135</a> WSConstants.WSSE_NS, <span class="jxr_string">"TransformationParameters"</span>) == 1) {
-<a name="136" href="#136">136</a> Element tmpE =
-<a name="137" href="#137">137</a> XMLUtils.selectNode(
-<a name="138" href="#138">138</a> <strong class="jxr_keyword">this</strong>._transformObject.getElement().getFirstChild(),
-<a name="139" href="#139">139</a> WSConstants.WSSE_NS,
-<a name="140" href="#140">140</a> <span class="jxr_string">"TransformationParameters"</span>,
-<a name="141" href="#141">141</a> 0
-<a name="142" href="#142">142</a> );
-<a name="143" href="#143">143</a> Element canonElem =
-<a name="144" href="#144">144</a> (Element) WSSecurityUtil.getDirectChild(
-<a name="145" href="#145">145</a> tmpE, <span class="jxr_string">"CanonicalizationMethod"</span>, WSConstants.SIG_NS
-<a name="146" href="#146">146</a> );
-<a name="147" href="#147">147</a> canonAlgo = canonElem.getAttribute(<span class="jxr_string">"Algorithm"</span>);
-<a name="148" href="#148">148</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="149" href="#149">149</a> log.debug(<span class="jxr_string">"CanonAlgo: "</span> + canonAlgo);
-<a name="150" href="#150">150</a> }
-<a name="151" href="#151">151</a> }
-<a name="152" href="#152">152</a> Canonicalizer canon = Canonicalizer.getInstance(canonAlgo);
-<a name="153" href="#153">153</a>
-<a name="154" href="#154">154</a> ByteArrayOutputStream bos = <strong class="jxr_keyword">null</strong>;
-<a name="155" href="#155">155</a> byte[] buf = <strong class="jxr_keyword">null</strong>;
-<a name="156" href="#156">156</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="157" href="#157">157</a> buf = input.getBytes();
-<a name="158" href="#158">158</a> bos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream(buf.length);
-<a name="159" href="#159">159</a> bos.write(buf, 0, buf.length);
-<a name="160" href="#160">160</a> log.debug(<span class="jxr_string">"canon bos: "</span> + bos.toString());
-<a name="161" href="#161">161</a> }
-<a name="162" href="#162">162</a>
-<a name="163" href="#163">163</a> <em class="jxr_comment">//</em>
-<a name="164" href="#164">164</a> <em class="jxr_comment">// Get the input (node) to transform. Currently we support only an</em>
-<a name="165" href="#165">165</a> <em class="jxr_comment">// Element as input format. If other formats are required we must</em>
-<a name="166" href="#166">166</a> <em class="jxr_comment">// get it as bytes and probably reparse it into a DOM tree (How to</em>
-<a name="167" href="#167">167</a> <em class="jxr_comment">// work with nodesets? how to select the right node from a nodeset?)</em>
-<a name="168" href="#168">168</a> <em class="jxr_comment">//</em>
-<a name="169" href="#169">169</a> Element str = <strong class="jxr_keyword">null</strong>;
-<a name="170" href="#170">170</a> <strong class="jxr_keyword">if</strong> (input.isElement()) {
-<a name="171" href="#171">171</a> str = (Element) input.getSubNode();
-<a name="172" href="#172">172</a> } <strong class="jxr_keyword">else</strong> {
-<a name="173" href="#173">173</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> CanonicalizationException(
-<a name="174" href="#174">174</a> <span class="jxr_string">"Wrong input format - only element input supported"</span>
-<a name="175" href="#175">175</a> );
-<a name="176" href="#176">176</a> }
-<a name="177" href="#177">177</a>
-<a name="178" href="#178">178</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="179" href="#179">179</a> log.debug(<span class="jxr_string">"STR: "</span> + str.toString());
-<a name="180" href="#180">180</a> }
-<a name="181" href="#181">181</a> <em class="jxr_comment">//</em>
-<a name="182" href="#182">182</a> <em class="jxr_comment">// The element to transform MUST be a SecurityTokenReference</em>
-<a name="183" href="#183">183</a> <em class="jxr_comment">// element.</em>
-<a name="184" href="#184">184</a> <em class="jxr_comment">//</em>
-<a name="185" href="#185">185</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(str);
-<a name="186" href="#186">186</a> <em class="jxr_comment">//</em>
-<a name="187" href="#187">187</a> <em class="jxr_comment">// Third and forth step are performed by derefenceSTR()</em>
-<a name="188" href="#188">188</a> <em class="jxr_comment">//</em>
-<a name="189" href="#189">189</a> Element dereferencedToken = dereferenceSTR(thisDoc, secRef);
-<a name="190" href="#190">190</a> <em class="jxr_comment">//</em>
-<a name="191" href="#191">191</a> <em class="jxr_comment">// C14n with specified algorithm. According to WSS Specification.</em>
-<a name="192" href="#192">192</a> <em class="jxr_comment">//</em>
-<a name="193" href="#193">193</a> buf = canon.canonicalizeSubtree(dereferencedToken, <span class="jxr_string">"#default"</span>);
-<a name="194" href="#194">194</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="195" href="#195">195</a> bos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream(buf.length);
-<a name="196" href="#196">196</a> bos.write(buf, 0, buf.length);
-<a name="197" href="#197">197</a> log.debug(<span class="jxr_string">"after c14n: "</span> + bos.toString());
-<a name="198" href="#198">198</a> }
-<a name="199" href="#199">199</a>
-<a name="200" href="#200">200</a> <em class="jxr_comment">//</em>
-<a name="201" href="#201">201</a> <em class="jxr_comment">// Alert: Hacks ahead According to WSS spec an Apex node must</em>
-<a name="202" href="#202">202</a> <em class="jxr_comment">// contain a default namespace. If none is availabe in the first</em>
-<a name="203" href="#203">203</a> <em class="jxr_comment">// node of the c14n output (this is the apex element) then we do</em>
-<a name="204" href="#204">204</a> <em class="jxr_comment">// some editing to insert an empty default namespace</em>
-<a name="205" href="#205">205</a> <em class="jxr_comment">// </em>
-<a name="206" href="#206">206</a> <em class="jxr_comment">// TODO: Rework theses hacks after c14n was updated and can be</em>
-<a name="207" href="#207">207</a> <em class="jxr_comment">// instructed to insert empty default namespace if required</em>
-<a name="208" href="#208">208</a> <em class="jxr_comment">//</em>
-<a name="209" href="#209">209</a> <em class="jxr_comment">// If the problem with c14n method is solved then just do:</em>
-<a name="210" href="#210">210</a> <em class="jxr_comment">// return new XMLSignatureInput(buf);</em>
-<a name="211" href="#211">211</a>
-<a name="212" href="#212">212</a> <em class="jxr_comment">// start of HACK</em>
-<a name="213" href="#213">213</a> StringBuffer bf = <strong class="jxr_keyword">new</strong> StringBuffer(<strong class="jxr_keyword">new</strong> String(buf));
-<a name="214" href="#214">214</a> String bf1 = bf.toString();
-<a name="215" href="#215">215</a>
-<a name="216" href="#216">216</a> <em class="jxr_comment">//</em>
-<a name="217" href="#217">217</a> <em class="jxr_comment">// Find start and end of first element <....>, this is the Apex node</em>
-<a name="218" href="#218">218</a> <em class="jxr_comment">//</em>
-<a name="219" href="#219">219</a> <strong class="jxr_keyword">int</strong> gt = bf1.indexOf(<span class="jxr_string">">"</span>);
-<a name="220" href="#220">220</a> <em class="jxr_comment">//</em>
-<a name="221" href="#221">221</a> <em class="jxr_comment">// Lookup the default namespace</em>
-<a name="222" href="#222">222</a> <em class="jxr_comment">//</em>
-<a name="223" href="#223">223</a> <strong class="jxr_keyword">int</strong> idx = bf1.indexOf(XMLNS);
-<a name="224" href="#224">224</a> <em class="jxr_comment">//</em>
-<a name="225" href="#225">225</a> <em class="jxr_comment">// If none found or if it is outside of this (Apex) element look for</em>
-<a name="226" href="#226">226</a> <em class="jxr_comment">// first blank in, insert default namespace there (this is the</em>
-<a name="227" href="#227">227</a> <em class="jxr_comment">// correct place according to c14n specification)</em>
-<a name="228" href="#228">228</a> <em class="jxr_comment">//</em>
-<a name="229" href="#229">229</a> <strong class="jxr_keyword">if</strong> (idx < 0 || idx > gt) {
-<a name="230" href="#230">230</a> idx = bf1.indexOf(<span class="jxr_string">" "</span>);
-<a name="231" href="#231">231</a> bf.insert(idx + 1, <span class="jxr_string">"xmlns=\"\" "</span>);
-<a name="232" href="#232">232</a> bf1 = bf.toString();
-<a name="233" href="#233">233</a> }
-<a name="234" href="#234">234</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="235" href="#235">235</a> log.debug(<span class="jxr_string">"last result: "</span>);
-<a name="236" href="#236">236</a> log.debug(bf1);
-<a name="237" href="#237">237</a> }
-<a name="238" href="#238">238</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> XMLSignatureInput(bf1.getBytes());
-<a name="239" href="#239">239</a> }
-<a name="240" href="#240">240</a> <em class="jxr_comment">// End of HACK</em>
-<a name="241" href="#241">241</a> <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) {
-<a name="242" href="#242">242</a> <strong class="jxr_keyword">throw</strong> (<strong class="jxr_keyword">new</strong> CanonicalizationException(<span class="jxr_string">"WS Security Exception"</span>, ex));
-<a name="243" href="#243">243</a> }
-<a name="244" href="#244">244</a> }
-<a name="245" href="#245">245</a>
-<a name="246" href="#246">246</a> <strong class="jxr_keyword">private</strong> Element dereferenceSTR(Document doc, <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef)
-<a name="247" href="#247">247</a> <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="248" href="#248">248</a> <em class="jxr_comment">//</em>
-<a name="249" href="#249">249</a> <em class="jxr_comment">// Third step: locate the security token referenced by the STR element.</em>
-<a name="250" href="#250">250</a> <em class="jxr_comment">// Either the Token is contained in the document as a</em>
-<a name="251" href="#251">251</a> <em class="jxr_comment">// BinarySecurityToken or stored in some key storage.</em>
-<a name="252" href="#252">252</a> <em class="jxr_comment">// </em>
-<a name="253" href="#253">253</a> <em class="jxr_comment">// Fourth step: after security token was located, prepare it. If its</em>
-<a name="254" href="#254">254</a> <em class="jxr_comment">// reference via a direct reference, i.e. a relative URI that references</em>
-<a name="255" href="#255">255</a> <em class="jxr_comment">// the BST directly in the message then just return that element.</em>
-<a name="256" href="#256">256</a> <em class="jxr_comment">// Otherwise wrap the located token in a newly created BST element as</em>
-<a name="257" href="#257">257</a> <em class="jxr_comment">// described in WSS Specification.</em>
-<a name="258" href="#258">258</a> <em class="jxr_comment">// </em>
-<a name="259" href="#259">259</a> <em class="jxr_comment">//</em>
-<a name="260" href="#260">260</a> Element tokElement = <strong class="jxr_keyword">null</strong>;
-<a name="261" href="#261">261</a>
-<a name="262" href="#262">262</a> <em class="jxr_comment">//</em>
-<a name="263" href="#263">263</a> <em class="jxr_comment">// First case: direct reference, according to chap 7.2 of OASIS WS</em>
-<a name="264" href="#264">264</a> <em class="jxr_comment">// specification (main document). Only in this case return a true</em>
-<a name="265" href="#265">265</a> <em class="jxr_comment">// reference to the BST. Copying is done by the caller.</em>
-<a name="266" href="#266">266</a> <em class="jxr_comment">//</em>
-<a name="267" href="#267">267</a> <strong class="jxr_keyword">if</strong> (secRef.containsReference()) {
-<a name="268" href="#268">268</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="269" href="#269">269</a> log.debug(<span class="jxr_string">"STR: Reference"</span>);
-<a name="270" href="#270">270</a> }
-<a name="271" href="#271">271</a> tokElement = secRef.getTokenElement(doc, wsDocInfo, <strong class="jxr_keyword">null</strong>);
-<a name="272" href="#272">272</a> }
-<a name="273" href="#273">273</a> <em class="jxr_comment">//</em>
-<a name="274" href="#274">274</a> <em class="jxr_comment">// second case: IssuerSerial, lookup in keystore, wrap in BST according</em>
-<a name="275" href="#275">275</a> <em class="jxr_comment">// to specification</em>
-<a name="276" href="#276">276</a> <em class="jxr_comment">//</em>
-<a name="277" href="#277">277</a> <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsX509Data() || secRef.containsX509IssuerSerial()) {
-<a name="278" href="#278">278</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="279" href="#279">279</a> log.debug(<span class="jxr_string">"STR: IssuerSerial"</span>);
-<a name="280" href="#280">280</a> }
-<a name="281" href="#281">281</a> X509Certificate cert = <strong class="jxr_keyword">null</strong>;
-<a name="282" href="#282">282</a> X509Certificate[] certs =
-<a name="283" href="#283">283</a> secRef.getX509IssuerSerial(wsDocInfo.getCrypto());
-<a name="284" href="#284">284</a> <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length == 0 || certs[0] == <strong class="jxr_keyword">null</strong>) {
-<a name="285" href="#285">285</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_CHECK);
-<a name="286" href="#286">286</a> }
-<a name="287" href="#287">287</a> cert = certs[0];
-<a name="288" href="#288">288</a> tokElement = createBSTX509(doc, cert, secRef.getElement());
-<a name="289" href="#289">289</a> }
-<a name="290" href="#290">290</a> <em class="jxr_comment">//</em>
-<a name="291" href="#291">291</a> <em class="jxr_comment">// third case: KeyIdentifier, must be SKI, lookup in keystore, wrap in</em>
-<a name="292" href="#292">292</a> <em class="jxr_comment">// BST according to specification. No other KeyIdentifier type handled</em>
-<a name="293" href="#293">293</a> <em class="jxr_comment">// here - just SKI</em>
-<a name="294" href="#294">294</a> <em class="jxr_comment">//</em>
-<a name="295" href="#295">295</a> <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) {
-<a name="296" href="#296">296</a> <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="297" href="#297">297</a> log.debug(<span class="jxr_string">"STR: KeyIdentifier"</span>);
-<a name="298" href="#298">298</a> }
-<a name="299" href="#299">299</a> X509Certificate cert = <strong class="jxr_keyword">null</strong>;
-<a name="300" href="#300">300</a> X509Certificate[] certs = secRef.getKeyIdentifier(wsDocInfo.getCrypto());
-<a name="301" href="#301">301</a> <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length == 0 || certs[0] == <strong class="jxr_keyword">null</strong>) {
-<a name="302" href="#302">302</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_CHECK);
-<a name="303" href="#303">303</a> }
-<a name="304" href="#304">304</a> cert = certs[0];
-<a name="305" href="#305">305</a> tokElement = createBSTX509(doc, cert, secRef.getElement());
-<a name="306" href="#306">306</a> }
-<a name="307" href="#307">307</a> <strong class="jxr_keyword">return</strong> (Element) tokElement;
-<a name="308" href="#308">308</a> }
-<a name="309" href="#309">309</a>
-<a name="310" href="#310">310</a> <strong class="jxr_keyword">private</strong> Element createBSTX509(Document doc, X509Certificate cert, Element secRefE)
-<a name="311" href="#311">311</a> <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="312" href="#312">312</a> byte data[];
-<a name="313" href="#313">313</a> <strong class="jxr_keyword">try</strong> {
-<a name="314" href="#314">314</a> data = cert.getEncoded();
-<a name="315" href="#315">315</a> } <strong class="jxr_keyword">catch</strong> (CertificateEncodingException e) {
-<a name="316" href="#316">316</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="317" href="#317">317</a> WSSecurityException.SECURITY_TOKEN_UNAVAILABLE, <span class="jxr_string">"encodeError"</span>, <strong class="jxr_keyword">null</strong>, e
-<a name="318" href="#318">318</a> );
-<a name="319" href="#319">319</a> }
-<a name="320" href="#320">320</a> String prefix = WSSecurityUtil.getPrefixNS(WSConstants.WSSE_NS, secRefE);
-<a name="321" href="#321">321</a> Element elem = doc.createElementNS(WSConstants.WSSE_NS, prefix + <span class="jxr_string">":BinarySecurityToken"</span>);
-<a name="322" href="#322">322</a> WSSecurityUtil.setNamespace(elem, WSConstants.WSSE_NS, prefix);
-<a name="323" href="#323">323</a> <em class="jxr_comment">// elem.setAttributeNS(WSConstants.XMLNS_NS, "xmlns", "");</em>
-<a name="324" href="#324">324</a> elem.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"ValueType"</span>, X509Security.X509_V3_TYPE);
-<a name="325" href="#325">325</a> Text certText = doc.createTextNode(Base64.encode(data)); <em class="jxr_comment">// no line wrap</em>
-<a name="326" href="#326">326</a> elem.appendChild(certText);
-<a name="327" href="#327">327</a> <strong class="jxr_keyword">return</strong> elem;
-<a name="328" href="#328">328</a> }
-<a name="329" href="#329">329</a>
-<a name="330" href="#330">330</a> }
+<a name="109" href="#109">109</a> <em class="jxr_comment">// Get the main document, that is the complete SOAP request document</em>
+<a name="110" href="#110">110</a> <em class="jxr_comment">//</em>
+<a name="111" href="#111">111</a> Document thisDoc = transformObject.getDocument();
+<a name="112" href="#112">112</a>
+<a name="113" href="#113">113</a> <em class="jxr_comment">//</em>
+<a name="114" href="#114">114</a> <em class="jxr_comment">// Here we get some information about the document that is being</em>
+<a name="115" href="#115">115</a> <em class="jxr_comment">// processed, in particular the crypto implementation, and already</em>
+<a name="116" href="#116">116</a> <em class="jxr_comment">// detected BST that may be used later during dereferencing.</em>
+<a name="117" href="#117">117</a> <em class="jxr_comment">//</em>
+<a name="118" href="#118">118</a> wsDocInfo = WSDocInfoStore.lookup(thisDoc);
+<a name="119" href="#119">119</a> <strong class="jxr_keyword">if</strong> (wsDocInfo == <strong class="jxr_keyword">null</strong>) {
+<a name="120" href="#120">120</a> <strong class="jxr_keyword">throw</strong> (<strong class="jxr_keyword">new</strong> CanonicalizationException(<span class="jxr_string">"no WSDocInfo found"</span>));
+<a name="121" href="#121">121</a> }
+<a name="122" href="#122">122</a> <em class="jxr_comment">//</em>
+<a name="123" href="#123">123</a> <em class="jxr_comment">// According to the OASIS WS Specification "Web Services Security:</em>
+<a name="124" href="#124">124</a> <em class="jxr_comment">// SOAP Message Security 1.0" Monday, 19 January 2004, chapter 8.3</em>
+<a name="125" href="#125">125</a> <em class="jxr_comment">// describes that the input node set must be processed by the c14n</em>
+<a name="126" href="#126">126</a> <em class="jxr_comment">// that is specified in the argument element of the STRTransform</em>
+<a name="127" href="#127">127</a> <em class="jxr_comment">// element.</em>
+<a name="128" href="#128">128</a> <em class="jxr_comment">// </em>
+<a name="129" href="#129">129</a> <em class="jxr_comment">// First step: Get the required c14n argument and get the specified</em>
+<a name="130" href="#130">130</a> <em class="jxr_comment">// Canonicalizer</em>
+<a name="131" href="#131">131</a> <em class="jxr_comment">//</em>
+<a name="132" href="#132">132</a> String canonAlgo = <strong class="jxr_keyword">null</strong>;
+<a name="133" href="#133">133</a> <strong class="jxr_keyword">if</strong> (transformObject.length(
+<a name="134" href="#134">134</a> WSConstants.WSSE_NS, <span class="jxr_string">"TransformationParameters"</span>) == 1) {
+<a name="135" href="#135">135</a> Element tmpE =
+<a name="136" href="#136">136</a> XMLUtils.selectNode(
+<a name="137" href="#137">137</a> transformObject.getElement().getFirstChild(),
+<a name="138" href="#138">138</a> WSConstants.WSSE_NS,
+<a name="139" href="#139">139</a> <span class="jxr_string">"TransformationParameters"</span>,
+<a name="140" href="#140">140</a> 0
+<a name="141" href="#141">141</a> );
+<a name="142" href="#142">142</a> Element canonElem =
+<a name="143" href="#143">143</a> (Element) WSSecurityUtil.getDirectChild(
+<a name="144" href="#144">144</a> tmpE, <span class="jxr_string">"CanonicalizationMethod"</span>, WSConstants.SIG_NS
+<a name="145" href="#145">145</a> );
+<a name="146" href="#146">146</a> canonAlgo = canonElem.getAttribute(<span class="jxr_string">"Algorithm"</span>);
+<a name="147" href="#147">147</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="148" href="#148">148</a> log.debug(<span class="jxr_string">"CanonAlgo: "</span> + canonAlgo);
+<a name="149" href="#149">149</a> }
+<a name="150" href="#150">150</a> }
+<a name="151" href="#151">151</a> Canonicalizer canon = Canonicalizer.getInstance(canonAlgo);
+<a name="152" href="#152">152</a>
+<a name="153" href="#153">153</a> ByteArrayOutputStream bos = <strong class="jxr_keyword">null</strong>;
+<a name="154" href="#154">154</a> byte[] buf = <strong class="jxr_keyword">null</strong>;
+<a name="155" href="#155">155</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="156" href="#156">156</a> buf = input.getBytes();
+<a name="157" href="#157">157</a> bos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream(buf.length);
+<a name="158" href="#158">158</a> bos.write(buf, 0, buf.length);
+<a name="159" href="#159">159</a> log.debug(<span class="jxr_string">"canon bos: "</span> + bos.toString());
+<a name="160" href="#160">160</a> }
+<a name="161" href="#161">161</a>
+<a name="162" href="#162">162</a> <em class="jxr_comment">//</em>
+<a name="163" href="#163">163</a> <em class="jxr_comment">// Get the input (node) to transform. Currently we support only an</em>
+<a name="164" href="#164">164</a> <em class="jxr_comment">// Element as input format. If other formats are required we must</em>
+<a name="165" href="#165">165</a> <em class="jxr_comment">// get it as bytes and probably reparse it into a DOM tree (How to</em>
+<a name="166" href="#166">166</a> <em class="jxr_comment">// work with nodesets? how to select the right node from a nodeset?)</em>
+<a name="167" href="#167">167</a> <em class="jxr_comment">//</em>
+<a name="168" href="#168">168</a> Element str = <strong class="jxr_keyword">null</strong>;
+<a name="169" href="#169">169</a> <strong class="jxr_keyword">if</strong> (input.isElement()) {
+<a name="170" href="#170">170</a> str = (Element) input.getSubNode();
+<a name="171" href="#171">171</a> } <strong class="jxr_keyword">else</strong> {
+<a name="172" href="#172">172</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> CanonicalizationException(
+<a name="173" href="#173">173</a> <span class="jxr_string">"Wrong input format - only element input supported"</span>
+<a name="174" href="#174">174</a> );
+<a name="175" href="#175">175</a> }
+<a name="176" href="#176">176</a>
+<a name="177" href="#177">177</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="178" href="#178">178</a> log.debug(<span class="jxr_string">"STR: "</span> + str.toString());
+<a name="179" href="#179">179</a> }
+<a name="180" href="#180">180</a> <em class="jxr_comment">//</em>
+<a name="181" href="#181">181</a> <em class="jxr_comment">// The element to transform MUST be a SecurityTokenReference</em>
+<a name="182" href="#182">182</a> <em class="jxr_comment">// element.</em>
+<a name="183" href="#183">183</a> <em class="jxr_comment">//</em>
+<a name="184" href="#184">184</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(str);
+<a name="185" href="#185">185</a> <em class="jxr_comment">//</em>
+<a name="186" href="#186">186</a> <em class="jxr_comment">// Third and forth step are performed by derefenceSTR()</em>
+<a name="187" href="#187">187</a> <em class="jxr_comment">//</em>
+<a name="188" href="#188">188</a> Element dereferencedToken = dereferenceSTR(thisDoc, secRef);
+<a name="189" href="#189">189</a> <em class="jxr_comment">//</em>
+<a name="190" href="#190">190</a> <em class="jxr_comment">// C14n with specified algorithm. According to WSS Specification.</em>
+<a name="191" href="#191">191</a> <em class="jxr_comment">//</em>
+<a name="192" href="#192">192</a> buf = canon.canonicalizeSubtree(dereferencedToken, <span class="jxr_string">"#default"</span>);
+<a name="193" href="#193">193</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="194" href="#194">194</a> bos = <strong class="jxr_keyword">new</strong> ByteArrayOutputStream(buf.length);
+<a name="195" href="#195">195</a> bos.write(buf, 0, buf.length);
+<a name="196" href="#196">196</a> log.debug(<span class="jxr_string">"after c14n: "</span> + bos.toString());
+<a name="197" href="#197">197</a> }
+<a name="198" href="#198">198</a>
+<a name="199" href="#199">199</a> <em class="jxr_comment">//</em>
+<a name="200" href="#200">200</a> <em class="jxr_comment">// Alert: Hacks ahead According to WSS spec an Apex node must</em>
+<a name="201" href="#201">201</a> <em class="jxr_comment">// contain a default namespace. If none is availabe in the first</em>
+<a name="202" href="#202">202</a> <em class="jxr_comment">// node of the c14n output (this is the apex element) then we do</em>
+<a name="203" href="#203">203</a> <em class="jxr_comment">// some editing to insert an empty default namespace</em>
+<a name="204" href="#204">204</a> <em class="jxr_comment">// </em>
+<a name="205" href="#205">205</a> <em class="jxr_comment">// TODO: Rework theses hacks after c14n was updated and can be</em>
+<a name="206" href="#206">206</a> <em class="jxr_comment">// instructed to insert empty default namespace if required</em>
+<a name="207" href="#207">207</a> <em class="jxr_comment">//</em>
+<a name="208" href="#208">208</a> <em class="jxr_comment">// If the problem with c14n method is solved then just do:</em>
+<a name="209" href="#209">209</a> <em class="jxr_comment">// return new XMLSignatureInput(buf);</em>
+<a name="210" href="#210">210</a>
+<a name="211" href="#211">211</a> <em class="jxr_comment">// start of HACK</em>
+<a name="212" href="#212">212</a> StringBuffer bf = <strong class="jxr_keyword">new</strong> StringBuffer(<strong class="jxr_keyword">new</strong> String(buf));
+<a name="213" href="#213">213</a> String bf1 = bf.toString();
+<a name="214" href="#214">214</a>
+<a name="215" href="#215">215</a> <em class="jxr_comment">//</em>
+<a name="216" href="#216">216</a> <em class="jxr_comment">// Find start and end of first element <....>, this is the Apex node</em>
+<a name="217" href="#217">217</a> <em class="jxr_comment">//</em>
+<a name="218" href="#218">218</a> <strong class="jxr_keyword">int</strong> gt = bf1.indexOf(<span class="jxr_string">">"</span>);
+<a name="219" href="#219">219</a> <em class="jxr_comment">//</em>
+<a name="220" href="#220">220</a> <em class="jxr_comment">// Lookup the default namespace</em>
+<a name="221" href="#221">221</a> <em class="jxr_comment">//</em>
+<a name="222" href="#222">222</a> <strong class="jxr_keyword">int</strong> idx = bf1.indexOf(XMLNS);
+<a name="223" href="#223">223</a> <em class="jxr_comment">//</em>
+<a name="224" href="#224">224</a> <em class="jxr_comment">// If none found or if it is outside of this (Apex) element look for</em>
+<a name="225" href="#225">225</a> <em class="jxr_comment">// first blank in, insert default namespace there (this is the</em>
+<a name="226" href="#226">226</a> <em class="jxr_comment">// correct place according to c14n specification)</em>
+<a name="227" href="#227">227</a> <em class="jxr_comment">//</em>
+<a name="228" href="#228">228</a> <strong class="jxr_keyword">if</strong> (idx < 0 || idx > gt) {
+<a name="229" href="#229">229</a> idx = bf1.indexOf(<span class="jxr_string">" "</span>);
+<a name="230" href="#230">230</a> bf.insert(idx + 1, <span class="jxr_string">"xmlns=\"\" "</span>);
+<a name="231" href="#231">231</a> bf1 = bf.toString();
+<a name="232" href="#232">232</a> }
+<a name="233" href="#233">233</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="234" href="#234">234</a> log.debug(<span class="jxr_string">"last result: "</span>);
+<a name="235" href="#235">235</a> log.debug(bf1);
+<a name="236" href="#236">236</a> }
+<a name="237" href="#237">237</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> XMLSignatureInput(bf1.getBytes());
+<a name="238" href="#238">238</a> }
+<a name="239" href="#239">239</a> <em class="jxr_comment">// End of HACK</em>
+<a name="240" href="#240">240</a> <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) {
+<a name="241" href="#241">241</a> <strong class="jxr_keyword">throw</strong> (<strong class="jxr_keyword">new</strong> CanonicalizationException(<span class="jxr_string">"WS Security Exception"</span>, ex));
+<a name="242" href="#242">242</a> }
+<a name="243" href="#243">243</a> }
+<a name="244" href="#244">244</a>
+<a name="245" href="#245">245</a> <strong class="jxr_keyword">private</strong> Element dereferenceSTR(Document doc, <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef)
+<a name="246" href="#246">246</a> <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="247" href="#247">247</a> <em class="jxr_comment">//</em>
+<a name="248" href="#248">248</a> <em class="jxr_comment">// Third step: locate the security token referenced by the STR element.</em>
+<a name="249" href="#249">249</a> <em class="jxr_comment">// Either the Token is contained in the document as a</em>
+<a name="250" href="#250">250</a> <em class="jxr_comment">// BinarySecurityToken or stored in some key storage.</em>
+<a name="251" href="#251">251</a> <em class="jxr_comment">// </em>
+<a name="252" href="#252">252</a> <em class="jxr_comment">// Fourth step: after security token was located, prepare it. If its</em>
+<a name="253" href="#253">253</a> <em class="jxr_comment">// reference via a direct reference, i.e. a relative URI that references</em>
+<a name="254" href="#254">254</a> <em class="jxr_comment">// the BST directly in the message then just return that element.</em>
+<a name="255" href="#255">255</a> <em class="jxr_comment">// Otherwise wrap the located token in a newly created BST element as</em>
+<a name="256" href="#256">256</a> <em class="jxr_comment">// described in WSS Specification.</em>
+<a name="257" href="#257">257</a> <em class="jxr_comment">// </em>
+<a name="258" href="#258">258</a> <em class="jxr_comment">//</em>
+<a name="259" href="#259">259</a> Element tokElement = <strong class="jxr_keyword">null</strong>;
+<a name="260" href="#260">260</a>
+<a name="261" href="#261">261</a> <em class="jxr_comment">//</em>
+<a name="262" href="#262">262</a> <em class="jxr_comment">// First case: direct reference, according to chap 7.2 of OASIS WS</em>
+<a name="263" href="#263">263</a> <em class="jxr_comment">// specification (main document). Only in this case return a true</em>
+<a name="264" href="#264">264</a> <em class="jxr_comment">// reference to the BST. Copying is done by the caller.</em>
+<a name="265" href="#265">265</a> <em class="jxr_comment">//</em>
+<a name="266" href="#266">266</a> <strong class="jxr_keyword">if</strong> (secRef.containsReference()) {
+<a name="267" href="#267">267</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="268" href="#268">268</a> log.debug(<span class="jxr_string">"STR: Reference"</span>);
+<a name="269" href="#269">269</a> }
+<a name="270" href="#270">270</a> tokElement = secRef.getTokenElement(doc, wsDocInfo, <strong class="jxr_keyword">null</strong>);
+<a name="271" href="#271">271</a> }
+<a name="272" href="#272">272</a> <em class="jxr_comment">//</em>
+<a name="273" href="#273">273</a> <em class="jxr_comment">// second case: IssuerSerial, lookup in keystore, wrap in BST according</em>
+<a name="274" href="#274">274</a> <em class="jxr_comment">// to specification</em>
+<a name="275" href="#275">275</a> <em class="jxr_comment">//</em>
+<a name="276" href="#276">276</a> <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsX509Data() || secRef.containsX509IssuerSerial()) {
+<a name="277" href="#277">277</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="278" href="#278">278</a> log.debug(<span class="jxr_string">"STR: IssuerSerial"</span>);
+<a name="279" href="#279">279</a> }
+<a name="280" href="#280">280</a> X509Certificate cert = <strong class="jxr_keyword">null</strong>;
+<a name="281" href="#281">281</a> X509Certificate[] certs =
+<a name="282" href="#282">282</a> secRef.getX509IssuerSerial(wsDocInfo.getCrypto());
+<a name="283" href="#283">283</a> <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length == 0 || certs[0] == <strong class="jxr_keyword">null</strong>) {
+<a name="284" href="#284">284</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_CHECK);
+<a name="285" href="#285">285</a> }
+<a name="286" href="#286">286</a> cert = certs[0];
+<a name="287" href="#287">287</a> tokElement = createBSTX509(doc, cert, secRef.getElement());
+<a name="288" href="#288">288</a> }
+<a name="289" href="#289">289</a> <em class="jxr_comment">//</em>
+<a name="290" href="#290">290</a> <em class="jxr_comment">// third case: KeyIdentifier. For SKI, lookup in keystore, wrap in</em>
+<a name="291" href="#291">291</a> <em class="jxr_comment">// BST according to specification. Otherwise if it's a wsse:KeyIdentifier it could</em>
+<a name="292" href="#292">292</a> <em class="jxr_comment">// be a SAML assertion, so try and find the referenced element.</em>
+<a name="293" href="#293">293</a> <em class="jxr_comment">//</em>
+<a name="294" href="#294">294</a> <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) {
+<a name="295" href="#295">295</a> <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="296" href="#296">296</a> log.debug(<span class="jxr_string">"STR: KeyIdentifier"</span>);
+<a name="297" href="#297">297</a> }
+<a name="298" href="#298">298</a> <strong class="jxr_keyword">if</strong> (WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(secRef.getKeyIdentifierValueType())) {
+<a name="299" href="#299">299</a> tokElement = secRef.getKeyIdentifierTokenElement(doc, wsDocInfo, <strong class="jxr_keyword">null</strong>);
+<a name="300" href="#300">300</a> } <strong class="jxr_keyword">else</strong> {
+<a name="301" href="#301">301</a> X509Certificate cert = <strong class="jxr_keyword">null</strong>;
+<a name="302" href="#302">302</a> X509Certificate[] certs = secRef.getKeyIdentifier(wsDocInfo.getCrypto());
+<a name="303" href="#303">303</a> <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length == 0 || certs[0] == <strong class="jxr_keyword">null</strong>) {
+<a name="304" href="#304">304</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILED_CHECK);
+<a name="305" href="#305">305</a> }
+<a name="306" href="#306">306</a> cert = certs[0];
+<a name="307" href="#307">307</a> tokElement = createBSTX509(doc, cert, secRef.getElement());
+<a name="308" href="#308">308</a> }
+<a name="309" href="#309">309</a> }
+<a name="310" href="#310">310</a> <strong class="jxr_keyword">return</strong> tokElement;
+<a name="311" href="#311">311</a> }
+<a name="312" href="#312">312</a>
+<a name="313" href="#313">313</a> <strong class="jxr_keyword">private</strong> Element createBSTX509(Document doc, X509Certificate cert, Element secRefE)
+<a name="314" href="#314">314</a> <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="315" href="#315">315</a> byte data[];
+<a name="316" href="#316">316</a> <strong class="jxr_keyword">try</strong> {
+<a name="317" href="#317">317</a> data = cert.getEncoded();
+<a name="318" href="#318">318</a> } <strong class="jxr_keyword">catch</strong> (CertificateEncodingException e) {
+<a name="319" href="#319">319</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="320" href="#320">320</a> WSSecurityException.SECURITY_TOKEN_UNAVAILABLE, <span class="jxr_string">"encodeError"</span>, <strong class="jxr_keyword">null</strong>, e
+<a name="321" href="#321">321</a> );
+<a name="322" href="#322">322</a> }
+<a name="323" href="#323">323</a> String prefix = WSSecurityUtil.getPrefixNS(WSConstants.WSSE_NS, secRefE);
+<a name="324" href="#324">324</a> Element elem = doc.createElementNS(WSConstants.WSSE_NS, prefix + <span class="jxr_string">":BinarySecurityToken"</span>);
+<a name="325" href="#325">325</a> WSSecurityUtil.setNamespace(elem, WSConstants.WSSE_NS, prefix);
+<a name="326" href="#326">326</a> <em class="jxr_comment">// elem.setAttributeNS(WSConstants.XMLNS_NS, "xmlns", "");</em>
+<a name="327" href="#327">327</a> elem.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"ValueType"</span>, X509Security.X509_V3_TYPE);
+<a name="328" href="#328">328</a> Text certText = doc.createTextNode(Base64.encode(data)); <em class="jxr_comment">// no line wrap</em>
+<a name="329" href="#329">329</a> elem.appendChild(certText);
+<a name="330" href="#330">330</a> <strong class="jxr_keyword">return</strong> elem;
+<a name="331" href="#331">331</a> }
+<a name="332" href="#332">332</a>
+<a name="333" href="#333">333</a> }
</pre>
<hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
</html>
Modified: webservices/wss4j/site/xref/org/apache/ws/security/transform/package-frame.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/transform/package-frame.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/transform/package-frame.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/transform/package-frame.html Mon Apr 20 13:56:25 2009
@@ -3,7 +3,7 @@
<html xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
- <title>WSS4J 1.5.6 Reference Package org.apache.ws.security.transform</title>
+ <title>WSS4J 1.5.7 Reference Package org.apache.ws.security.transform</title>
<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="style" />
</head>
<body>
Modified: webservices/wss4j/site/xref/org/apache/ws/security/transform/package-summary.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/transform/package-summary.html?rev=766696&r1=766695&r2=766696&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/transform/package-summary.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/transform/package-summary.html Mon Apr 20 13:56:25 2009
@@ -3,7 +3,7 @@
<html xml:lang="en" lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
- <title>WSS4J 1.5.6 Reference Package org.apache.ws.security.transform</title>
+ <title>WSS4J 1.5.7 Reference Package org.apache.ws.security.transform</title>
<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="style" />
</head>
<body>
---------------------------------------------------------------------
To unsubscribe, e-mail: wss4j-dev-unsubscribe@ws.apache.org
For additional commands, e-mail: wss4j-dev-help@ws.apache.org