You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ws.apache.org by co...@apache.org on 2011/10/03 17:16:11 UTC
svn commit: r1178426 [36/40] - in /webservices/wss4j/site: ./ apidocs/
apidocs/org/apache/ws/security/ apidocs/org/apache/ws/security/action/
apidocs/org/apache/ws/security/action/class-use/
apidocs/org/apache/ws/security/class-use/ apidocs/org/apache/...
Modified: webservices/wss4j/site/xref/org/apache/ws/security/str/BSPEnforcer.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/str/BSPEnforcer.html?rev=1178426&r1=1178425&r2=1178426&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/str/BSPEnforcer.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/str/BSPEnforcer.html Mon Oct 3 15:15:52 2011
@@ -32,203 +32,201 @@
<a name="22" href="#22">22</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSConstants;
<a name="23" href="#23">23</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityException;
<a name="24" href="#24">24</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.BinarySecurity;
-<a name="25" href="#25">25</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.PKIPathSecurity;
-<a name="26" href="#26">26</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.SecurityTokenReference;
-<a name="27" href="#27">27</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.X509Security;
-<a name="28" href="#28">28</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.ext.AssertionWrapper;
-<a name="29" href="#29">29</a>
-<a name="30" href="#30">30</a> <em class="jxr_javadoccomment">/**</em>
-<a name="31" href="#31">31</a> <em class="jxr_javadoccomment"> * This class enforces processing rules for SecurityTokenReferences to various token elements,</em>
-<a name="32" href="#32">32</a> <em class="jxr_javadoccomment"> * according to the Basic Security Profile (BSP) specification.</em>
-<a name="33" href="#33">33</a> <em class="jxr_javadoccomment"> */</em>
-<a name="34" href="#34">34</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">final</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/str/BSPEnforcer.html">BSPEnforcer</a> {
-<a name="35" href="#35">35</a>
-<a name="36" href="#36">36</a> <strong class="jxr_keyword">private</strong> <a href="../../../../../org/apache/ws/security/str/BSPEnforcer.html">BSPEnforcer</a>() {
-<a name="37" href="#37">37</a> <em class="jxr_comment">//</em>
-<a name="38" href="#38">38</a> }
-<a name="39" href="#39">39</a>
-<a name="40" href="#40">40</a> <em class="jxr_javadoccomment">/**</em>
-<a name="41" href="#41">41</a> <em class="jxr_javadoccomment"> * Check that the BinarySecurityToken referenced by the SecurityTokenReference argument </em>
-<a name="42" href="#42">42</a> <em class="jxr_javadoccomment"> * is BSP compliant.</em>
-<a name="43" href="#43">43</a> <em class="jxr_javadoccomment"> * @param secRef The SecurityTokenReference to the BinarySecurityToken</em>
-<a name="44" href="#44">44</a> <em class="jxr_javadoccomment"> * @param token The BinarySecurityToken</em>
-<a name="45" href="#45">45</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em>
-<a name="46" href="#46">46</a> <em class="jxr_javadoccomment"> */</em>
-<a name="47" href="#47">47</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> checkBinarySecurityBSPCompliance(
-<a name="48" href="#48">48</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef,
-<a name="49" href="#49">49</a> <a href="../../../../../org/apache/ws/security/message/token/BinarySecurity.html">BinarySecurity</a> token
-<a name="50" href="#50">50</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="51" href="#51">51</a> <strong class="jxr_keyword">if</strong> (secRef.containsReference()) {
-<a name="52" href="#52">52</a> <em class="jxr_comment">// Check the ValueType attributes</em>
-<a name="53" href="#53">53</a> String valueType = secRef.getReference().getValueType();
-<a name="54" href="#54">54</a> <strong class="jxr_keyword">if</strong> ((token instanceof X509Security) && !X509Security.X509_V3_TYPE.equals(valueType)) {
-<a name="55" href="#55">55</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="56" href="#56">56</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="57" href="#57">57</a> <span class="jxr_string">"invalidValueType"</span>,
-<a name="58" href="#58">58</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
-<a name="59" href="#59">59</a> );
-<a name="60" href="#60">60</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> ((token instanceof PKIPathSecurity)
-<a name="61" href="#61">61</a> && (!PKIPathSecurity.PKI_TYPE.equals(valueType))) {
-<a name="62" href="#62">62</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="63" href="#63">63</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="64" href="#64">64</a> <span class="jxr_string">"invalidValueType"</span>,
-<a name="65" href="#65">65</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
-<a name="66" href="#66">66</a> );
-<a name="67" href="#67">67</a> }
-<a name="68" href="#68">68</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) {
-<a name="69" href="#69">69</a> String valueType = secRef.getKeyIdentifierValueType();
-<a name="70" href="#70">70</a> <strong class="jxr_keyword">if</strong> (!SecurityTokenReference.SKI_URI.equals(valueType)
-<a name="71" href="#71">71</a> && !SecurityTokenReference.THUMB_URI.equals(valueType)) {
-<a name="72" href="#72">72</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="73" href="#73">73</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="74" href="#74">74</a> <span class="jxr_string">"invalidValueType"</span>,
-<a name="75" href="#75">75</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
-<a name="76" href="#76">76</a> );
-<a name="77" href="#77">77</a> }
-<a name="78" href="#78">78</a> }
-<a name="79" href="#79">79</a>
-<a name="80" href="#80">80</a> <em class="jxr_comment">// Check TokenType attributes</em>
-<a name="81" href="#81">81</a> <strong class="jxr_keyword">if</strong> (token instanceof PKIPathSecurity) {
-<a name="82" href="#82">82</a> String tokenType = secRef.getTokenType();
-<a name="83" href="#83">83</a> <strong class="jxr_keyword">if</strong> (!PKIPathSecurity.PKI_TYPE.equals(tokenType)) {
-<a name="84" href="#84">84</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="85" href="#85">85</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="86" href="#86">86</a> <span class="jxr_string">"invalidTokenType"</span>,
-<a name="87" href="#87">87</a> <strong class="jxr_keyword">new</strong> Object[]{tokenType}
-<a name="88" href="#88">88</a> );
-<a name="89" href="#89">89</a> }
-<a name="90" href="#90">90</a> }
-<a name="91" href="#91">91</a> }
-<a name="92" href="#92">92</a>
-<a name="93" href="#93">93</a> <em class="jxr_javadoccomment">/**</em>
-<a name="94" href="#94">94</a> <em class="jxr_javadoccomment"> * Check that the EncryptedKey referenced by the SecurityTokenReference argument </em>
-<a name="95" href="#95">95</a> <em class="jxr_javadoccomment"> * is BSP compliant.</em>
-<a name="96" href="#96">96</a> <em class="jxr_javadoccomment"> * @param secRef The SecurityTokenReference to the BinarySecurityToken</em>
-<a name="97" href="#97">97</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em>
-<a name="98" href="#98">98</a> <em class="jxr_javadoccomment"> */</em>
-<a name="99" href="#99">99</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> checkEncryptedKeyBSPCompliance(
-<a name="100" href="#100">100</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef
-<a name="101" href="#101">101</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="102" href="#102">102</a> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) {
-<a name="103" href="#103">103</a> String valueType = secRef.getKeyIdentifierValueType();
-<a name="104" href="#104">104</a> <strong class="jxr_keyword">if</strong> (!SecurityTokenReference.ENC_KEY_SHA1_URI.equals(valueType)) {
-<a name="105" href="#105">105</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="106" href="#106">106</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="107" href="#107">107</a> <span class="jxr_string">"invalidValueType"</span>,
-<a name="108" href="#108">108</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
-<a name="109" href="#109">109</a> );
-<a name="110" href="#110">110</a> }
-<a name="111" href="#111">111</a> }
-<a name="112" href="#112">112</a>
-<a name="113" href="#113">113</a> String tokenType = secRef.getTokenType();
-<a name="114" href="#114">114</a> <strong class="jxr_keyword">if</strong> (!WSConstants.WSS_ENC_KEY_VALUE_TYPE.equals(tokenType)) {
-<a name="115" href="#115">115</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="116" href="#116">116</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="117" href="#117">117</a> <span class="jxr_string">"invalidTokenType"</span>,
-<a name="118" href="#118">118</a> <strong class="jxr_keyword">new</strong> Object[]{tokenType}
-<a name="119" href="#119">119</a> );
-<a name="120" href="#120">120</a> }
-<a name="121" href="#121">121</a> }
-<a name="122" href="#122">122</a>
-<a name="123" href="#123">123</a> <em class="jxr_javadoccomment">/**</em>
-<a name="124" href="#124">124</a> <em class="jxr_javadoccomment"> * Check that the SAML token referenced by the SecurityTokenReference argument </em>
-<a name="125" href="#125">125</a> <em class="jxr_javadoccomment"> * is BSP compliant.</em>
-<a name="126" href="#126">126</a> <em class="jxr_javadoccomment"> * @param secRef The SecurityTokenReference to the SAML token</em>
-<a name="127" href="#127">127</a> <em class="jxr_javadoccomment"> * @param assertion The SAML Token AssertionWrapper object</em>
-<a name="128" href="#128">128</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em>
-<a name="129" href="#129">129</a> <em class="jxr_javadoccomment"> */</em>
-<a name="130" href="#130">130</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> checkSamlTokenBSPCompliance(
-<a name="131" href="#131">131</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef,
-<a name="132" href="#132">132</a> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion
-<a name="133" href="#133">133</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="134" href="#134">134</a> <em class="jxr_comment">// Check the KeyIdentifier ValueType attributes</em>
-<a name="135" href="#135">135</a> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) {
-<a name="136" href="#136">136</a> String valueType = secRef.getKeyIdentifierValueType();
-<a name="137" href="#137">137</a> <strong class="jxr_keyword">if</strong> (assertion.getSaml1() != <strong class="jxr_keyword">null</strong>
-<a name="138" href="#138">138</a> && !WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(valueType)) {
-<a name="139" href="#139">139</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="140" href="#140">140</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="141" href="#141">141</a> <span class="jxr_string">"invalidValueType"</span>,
-<a name="142" href="#142">142</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
-<a name="143" href="#143">143</a> );
-<a name="144" href="#144">144</a> }
-<a name="145" href="#145">145</a> <strong class="jxr_keyword">if</strong> (assertion.getSaml2() != <strong class="jxr_keyword">null</strong>
-<a name="146" href="#146">146</a> && !WSConstants.WSS_SAML2_KI_VALUE_TYPE.equals(valueType)) {
-<a name="147" href="#147">147</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="148" href="#148">148</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="149" href="#149">149</a> <span class="jxr_string">"invalidValueType"</span>,
-<a name="150" href="#150">150</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
-<a name="151" href="#151">151</a> );
-<a name="152" href="#152">152</a> }
-<a name="153" href="#153">153</a> String encoding = secRef.getKeyIdentifierEncodingType();
-<a name="154" href="#154">154</a> <strong class="jxr_keyword">if</strong> (encoding != <strong class="jxr_keyword">null</strong> && !<span class="jxr_string">""</span>.equals(encoding)) {
-<a name="155" href="#155">155</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="156" href="#156">156</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="157" href="#157">157</a> <span class="jxr_string">"badEncodingType"</span>,
-<a name="158" href="#158">158</a> <strong class="jxr_keyword">new</strong> Object[]{encoding}
-<a name="159" href="#159">159</a> );
-<a name="160" href="#160">160</a> }
-<a name="161" href="#161">161</a> }
-<a name="162" href="#162">162</a>
-<a name="163" href="#163">163</a> <em class="jxr_comment">// Check the TokenType attribute</em>
-<a name="164" href="#164">164</a> String tokenType = secRef.getTokenType();
-<a name="165" href="#165">165</a> <strong class="jxr_keyword">if</strong> (assertion.getSaml1() != <strong class="jxr_keyword">null</strong> && !WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType)) {
-<a name="166" href="#166">166</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="167" href="#167">167</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="168" href="#168">168</a> <span class="jxr_string">"invalidTokenType"</span>,
-<a name="169" href="#169">169</a> <strong class="jxr_keyword">new</strong> Object[]{tokenType}
-<a name="170" href="#170">170</a> );
-<a name="171" href="#171">171</a> }
-<a name="172" href="#172">172</a> <strong class="jxr_keyword">if</strong> (assertion.getSaml2() != <strong class="jxr_keyword">null</strong> && !WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType)) {
-<a name="173" href="#173">173</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="174" href="#174">174</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="175" href="#175">175</a> <span class="jxr_string">"invalidTokenType"</span>,
-<a name="176" href="#176">176</a> <strong class="jxr_keyword">new</strong> Object[]{tokenType}
-<a name="177" href="#177">177</a> );
-<a name="178" href="#178">178</a> }
-<a name="179" href="#179">179</a>
-<a name="180" href="#180">180</a> <em class="jxr_comment">// Check the ValueType attribute of the Reference for SAML2</em>
-<a name="181" href="#181">181</a> <strong class="jxr_keyword">if</strong> (assertion.getSaml2() != <strong class="jxr_keyword">null</strong> && secRef.containsReference()) {
-<a name="182" href="#182">182</a> String valueType = secRef.getReference().getValueType();
-<a name="183" href="#183">183</a> <strong class="jxr_keyword">if</strong> (valueType != <strong class="jxr_keyword">null</strong> && !<span class="jxr_string">""</span>.equals(valueType)) {
-<a name="184" href="#184">184</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="185" href="#185">185</a> WSSecurityException.INVALID_SECURITY_TOKEN,
-<a name="186" href="#186">186</a> <span class="jxr_string">"invalidValueType"</span>,
-<a name="187" href="#187">187</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
-<a name="188" href="#188">188</a> );
-<a name="189" href="#189">189</a> }
-<a name="190" href="#190">190</a> }
-<a name="191" href="#191">191</a> }
-<a name="192" href="#192">192</a>
-<a name="193" href="#193">193</a> <em class="jxr_javadoccomment">/**</em>
-<a name="194" href="#194">194</a> <em class="jxr_javadoccomment"> * Check that the Username token referenced by the SecurityTokenReference argument </em>
-<a name="195" href="#195">195</a> <em class="jxr_javadoccomment"> * is BSP compliant.</em>
-<a name="196" href="#196">196</a> <em class="jxr_javadoccomment"> * @param secRef The SecurityTokenReference to the Username token</em>
-<a name="197" href="#197">197</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em>
-<a name="198" href="#198">198</a> <em class="jxr_javadoccomment"> */</em>
-<a name="199" href="#199">199</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> checkUsernameTokenBSPCompliance(
-<a name="200" href="#200">200</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef
-<a name="201" href="#201">201</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="202" href="#202">202</a> <strong class="jxr_keyword">if</strong> (!secRef.containsReference()) {
-<a name="203" href="#203">203</a> <em class="jxr_comment">// BSP does not permit using a KeyIdentifier to refer to a U/T</em>
-<a name="204" href="#204">204</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="205" href="#205">205</a> WSSecurityException.FAILED_CHECK, <span class="jxr_string">"unsupportedKeyId"</span>
-<a name="206" href="#206">206</a> );
-<a name="207" href="#207">207</a> }
-<a name="208" href="#208">208</a>
-<a name="209" href="#209">209</a> String valueType = secRef.getReference().getValueType();
-<a name="210" href="#210">210</a> <strong class="jxr_keyword">if</strong> (!WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE.equals(valueType)) {
-<a name="211" href="#211">211</a> <em class="jxr_comment">// BSP says the Reference must have a ValueType of UsernameToken</em>
-<a name="212" href="#212">212</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="213" href="#213">213</a> WSSecurityException.INVALID_SECURITY,
-<a name="214" href="#214">214</a> <span class="jxr_string">"invalidValueType"</span>,
-<a name="215" href="#215">215</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
-<a name="216" href="#216">216</a> );
-<a name="217" href="#217">217</a> }
-<a name="218" href="#218">218</a> }
-<a name="219" href="#219">219</a>
-<a name="220" href="#220">220</a>
-<a name="221" href="#221">221</a> }
+<a name="25" href="#25">25</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.KerberosSecurity;
+<a name="26" href="#26">26</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.PKIPathSecurity;
+<a name="27" href="#27">27</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.SecurityTokenReference;
+<a name="28" href="#28">28</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.X509Security;
+<a name="29" href="#29">29</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.ext.AssertionWrapper;
+<a name="30" href="#30">30</a>
+<a name="31" href="#31">31</a> <em class="jxr_javadoccomment">/**</em>
+<a name="32" href="#32">32</a> <em class="jxr_javadoccomment"> * This class enforces processing rules for SecurityTokenReferences to various token elements,</em>
+<a name="33" href="#33">33</a> <em class="jxr_javadoccomment"> * according to the Basic Security Profile (BSP) specification.</em>
+<a name="34" href="#34">34</a> <em class="jxr_javadoccomment"> */</em>
+<a name="35" href="#35">35</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">final</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/str/BSPEnforcer.html">BSPEnforcer</a> {
+<a name="36" href="#36">36</a>
+<a name="37" href="#37">37</a> <strong class="jxr_keyword">private</strong> <a href="../../../../../org/apache/ws/security/str/BSPEnforcer.html">BSPEnforcer</a>() {
+<a name="38" href="#38">38</a> <em class="jxr_comment">//</em>
+<a name="39" href="#39">39</a> }
+<a name="40" href="#40">40</a>
+<a name="41" href="#41">41</a> <em class="jxr_javadoccomment">/**</em>
+<a name="42" href="#42">42</a> <em class="jxr_javadoccomment"> * Check that the BinarySecurityToken referenced by the SecurityTokenReference argument </em>
+<a name="43" href="#43">43</a> <em class="jxr_javadoccomment"> * is BSP compliant.</em>
+<a name="44" href="#44">44</a> <em class="jxr_javadoccomment"> * @param secRef The SecurityTokenReference to the BinarySecurityToken</em>
+<a name="45" href="#45">45</a> <em class="jxr_javadoccomment"> * @param token The BinarySecurityToken</em>
+<a name="46" href="#46">46</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em>
+<a name="47" href="#47">47</a> <em class="jxr_javadoccomment"> */</em>
+<a name="48" href="#48">48</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> checkBinarySecurityBSPCompliance(
+<a name="49" href="#49">49</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef,
+<a name="50" href="#50">50</a> <a href="../../../../../org/apache/ws/security/message/token/BinarySecurity.html">BinarySecurity</a> token
+<a name="51" href="#51">51</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="52" href="#52">52</a> <strong class="jxr_keyword">if</strong> (secRef.containsReference()) {
+<a name="53" href="#53">53</a> <em class="jxr_comment">// Check the ValueType attributes</em>
+<a name="54" href="#54">54</a> String valueType = secRef.getReference().getValueType();
+<a name="55" href="#55">55</a> <strong class="jxr_keyword">if</strong> (((token instanceof X509Security) && !X509Security.X509_V3_TYPE.equals(valueType))
+<a name="56" href="#56">56</a> || ((token instanceof PKIPathSecurity) && !PKIPathSecurity.PKI_TYPE.equals(valueType))
+<a name="57" href="#57">57</a> || ((token instanceof KerberosSecurity)
+<a name="58" href="#58">58</a> && !WSConstants.WSS_GSS_KRB_V5_AP_REQ.equals(valueType))) {
+<a name="59" href="#59">59</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="60" href="#60">60</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="61" href="#61">61</a> <span class="jxr_string">"invalidValueType"</span>,
+<a name="62" href="#62">62</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
+<a name="63" href="#63">63</a> );
+<a name="64" href="#64">64</a> }
+<a name="65" href="#65">65</a> } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) {
+<a name="66" href="#66">66</a> String valueType = secRef.getKeyIdentifierValueType();
+<a name="67" href="#67">67</a> <strong class="jxr_keyword">if</strong> (!SecurityTokenReference.SKI_URI.equals(valueType)
+<a name="68" href="#68">68</a> && !SecurityTokenReference.THUMB_URI.equals(valueType)
+<a name="69" href="#69">69</a> && !WSConstants.WSS_KRB_KI_VALUE_TYPE.equals(valueType)) {
+<a name="70" href="#70">70</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="71" href="#71">71</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="72" href="#72">72</a> <span class="jxr_string">"invalidValueType"</span>,
+<a name="73" href="#73">73</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
+<a name="74" href="#74">74</a> );
+<a name="75" href="#75">75</a> }
+<a name="76" href="#76">76</a> }
+<a name="77" href="#77">77</a>
+<a name="78" href="#78">78</a> <em class="jxr_comment">// Check TokenType attributes</em>
+<a name="79" href="#79">79</a> <strong class="jxr_keyword">if</strong> (token instanceof PKIPathSecurity) {
+<a name="80" href="#80">80</a> String tokenType = secRef.getTokenType();
+<a name="81" href="#81">81</a> <strong class="jxr_keyword">if</strong> (!PKIPathSecurity.PKI_TYPE.equals(tokenType)) {
+<a name="82" href="#82">82</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="83" href="#83">83</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="84" href="#84">84</a> <span class="jxr_string">"invalidTokenType"</span>,
+<a name="85" href="#85">85</a> <strong class="jxr_keyword">new</strong> Object[]{tokenType}
+<a name="86" href="#86">86</a> );
+<a name="87" href="#87">87</a> }
+<a name="88" href="#88">88</a> }
+<a name="89" href="#89">89</a> }
+<a name="90" href="#90">90</a>
+<a name="91" href="#91">91</a> <em class="jxr_javadoccomment">/**</em>
+<a name="92" href="#92">92</a> <em class="jxr_javadoccomment"> * Check that the EncryptedKey referenced by the SecurityTokenReference argument </em>
+<a name="93" href="#93">93</a> <em class="jxr_javadoccomment"> * is BSP compliant.</em>
+<a name="94" href="#94">94</a> <em class="jxr_javadoccomment"> * @param secRef The SecurityTokenReference to the BinarySecurityToken</em>
+<a name="95" href="#95">95</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em>
+<a name="96" href="#96">96</a> <em class="jxr_javadoccomment"> */</em>
+<a name="97" href="#97">97</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> checkEncryptedKeyBSPCompliance(
+<a name="98" href="#98">98</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef
+<a name="99" href="#99">99</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="100" href="#100">100</a> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) {
+<a name="101" href="#101">101</a> String valueType = secRef.getKeyIdentifierValueType();
+<a name="102" href="#102">102</a> <strong class="jxr_keyword">if</strong> (!SecurityTokenReference.ENC_KEY_SHA1_URI.equals(valueType)) {
+<a name="103" href="#103">103</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="104" href="#104">104</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="105" href="#105">105</a> <span class="jxr_string">"invalidValueType"</span>,
+<a name="106" href="#106">106</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
+<a name="107" href="#107">107</a> );
+<a name="108" href="#108">108</a> }
+<a name="109" href="#109">109</a> }
+<a name="110" href="#110">110</a>
+<a name="111" href="#111">111</a> String tokenType = secRef.getTokenType();
+<a name="112" href="#112">112</a> <strong class="jxr_keyword">if</strong> (!WSConstants.WSS_ENC_KEY_VALUE_TYPE.equals(tokenType)) {
+<a name="113" href="#113">113</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="114" href="#114">114</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="115" href="#115">115</a> <span class="jxr_string">"invalidTokenType"</span>,
+<a name="116" href="#116">116</a> <strong class="jxr_keyword">new</strong> Object[]{tokenType}
+<a name="117" href="#117">117</a> );
+<a name="118" href="#118">118</a> }
+<a name="119" href="#119">119</a> }
+<a name="120" href="#120">120</a>
+<a name="121" href="#121">121</a> <em class="jxr_javadoccomment">/**</em>
+<a name="122" href="#122">122</a> <em class="jxr_javadoccomment"> * Check that the SAML token referenced by the SecurityTokenReference argument </em>
+<a name="123" href="#123">123</a> <em class="jxr_javadoccomment"> * is BSP compliant.</em>
+<a name="124" href="#124">124</a> <em class="jxr_javadoccomment"> * @param secRef The SecurityTokenReference to the SAML token</em>
+<a name="125" href="#125">125</a> <em class="jxr_javadoccomment"> * @param assertion The SAML Token AssertionWrapper object</em>
+<a name="126" href="#126">126</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em>
+<a name="127" href="#127">127</a> <em class="jxr_javadoccomment"> */</em>
+<a name="128" href="#128">128</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> checkSamlTokenBSPCompliance(
+<a name="129" href="#129">129</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef,
+<a name="130" href="#130">130</a> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion
+<a name="131" href="#131">131</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="132" href="#132">132</a> <em class="jxr_comment">// Check the KeyIdentifier ValueType attributes</em>
+<a name="133" href="#133">133</a> <strong class="jxr_keyword">if</strong> (secRef.containsKeyIdentifier()) {
+<a name="134" href="#134">134</a> String valueType = secRef.getKeyIdentifierValueType();
+<a name="135" href="#135">135</a> <strong class="jxr_keyword">if</strong> (assertion.getSaml1() != <strong class="jxr_keyword">null</strong>
+<a name="136" href="#136">136</a> && !WSConstants.WSS_SAML_KI_VALUE_TYPE.equals(valueType)) {
+<a name="137" href="#137">137</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="138" href="#138">138</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="139" href="#139">139</a> <span class="jxr_string">"invalidValueType"</span>,
+<a name="140" href="#140">140</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
+<a name="141" href="#141">141</a> );
+<a name="142" href="#142">142</a> }
+<a name="143" href="#143">143</a> <strong class="jxr_keyword">if</strong> (assertion.getSaml2() != <strong class="jxr_keyword">null</strong>
+<a name="144" href="#144">144</a> && !WSConstants.WSS_SAML2_KI_VALUE_TYPE.equals(valueType)) {
+<a name="145" href="#145">145</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="146" href="#146">146</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="147" href="#147">147</a> <span class="jxr_string">"invalidValueType"</span>,
+<a name="148" href="#148">148</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
+<a name="149" href="#149">149</a> );
+<a name="150" href="#150">150</a> }
+<a name="151" href="#151">151</a> String encoding = secRef.getKeyIdentifierEncodingType();
+<a name="152" href="#152">152</a> <strong class="jxr_keyword">if</strong> (encoding != <strong class="jxr_keyword">null</strong> && !<span class="jxr_string">""</span>.equals(encoding)) {
+<a name="153" href="#153">153</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="154" href="#154">154</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="155" href="#155">155</a> <span class="jxr_string">"badEncodingType"</span>,
+<a name="156" href="#156">156</a> <strong class="jxr_keyword">new</strong> Object[]{encoding}
+<a name="157" href="#157">157</a> );
+<a name="158" href="#158">158</a> }
+<a name="159" href="#159">159</a> }
+<a name="160" href="#160">160</a>
+<a name="161" href="#161">161</a> <em class="jxr_comment">// Check the TokenType attribute</em>
+<a name="162" href="#162">162</a> String tokenType = secRef.getTokenType();
+<a name="163" href="#163">163</a> <strong class="jxr_keyword">if</strong> (assertion.getSaml1() != <strong class="jxr_keyword">null</strong> && !WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType)) {
+<a name="164" href="#164">164</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="165" href="#165">165</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="166" href="#166">166</a> <span class="jxr_string">"invalidTokenType"</span>,
+<a name="167" href="#167">167</a> <strong class="jxr_keyword">new</strong> Object[]{tokenType}
+<a name="168" href="#168">168</a> );
+<a name="169" href="#169">169</a> }
+<a name="170" href="#170">170</a> <strong class="jxr_keyword">if</strong> (assertion.getSaml2() != <strong class="jxr_keyword">null</strong> && !WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType)) {
+<a name="171" href="#171">171</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="172" href="#172">172</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="173" href="#173">173</a> <span class="jxr_string">"invalidTokenType"</span>,
+<a name="174" href="#174">174</a> <strong class="jxr_keyword">new</strong> Object[]{tokenType}
+<a name="175" href="#175">175</a> );
+<a name="176" href="#176">176</a> }
+<a name="177" href="#177">177</a>
+<a name="178" href="#178">178</a> <em class="jxr_comment">// Check the ValueType attribute of the Reference for SAML2</em>
+<a name="179" href="#179">179</a> <strong class="jxr_keyword">if</strong> (assertion.getSaml2() != <strong class="jxr_keyword">null</strong> && secRef.containsReference()) {
+<a name="180" href="#180">180</a> String valueType = secRef.getReference().getValueType();
+<a name="181" href="#181">181</a> <strong class="jxr_keyword">if</strong> (valueType != <strong class="jxr_keyword">null</strong> && !<span class="jxr_string">""</span>.equals(valueType)) {
+<a name="182" href="#182">182</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="183" href="#183">183</a> WSSecurityException.INVALID_SECURITY_TOKEN,
+<a name="184" href="#184">184</a> <span class="jxr_string">"invalidValueType"</span>,
+<a name="185" href="#185">185</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
+<a name="186" href="#186">186</a> );
+<a name="187" href="#187">187</a> }
+<a name="188" href="#188">188</a> }
+<a name="189" href="#189">189</a> }
+<a name="190" href="#190">190</a>
+<a name="191" href="#191">191</a> <em class="jxr_javadoccomment">/**</em>
+<a name="192" href="#192">192</a> <em class="jxr_javadoccomment"> * Check that the Username token referenced by the SecurityTokenReference argument </em>
+<a name="193" href="#193">193</a> <em class="jxr_javadoccomment"> * is BSP compliant.</em>
+<a name="194" href="#194">194</a> <em class="jxr_javadoccomment"> * @param secRef The SecurityTokenReference to the Username token</em>
+<a name="195" href="#195">195</a> <em class="jxr_javadoccomment"> * @throws WSSecurityException</em>
+<a name="196" href="#196">196</a> <em class="jxr_javadoccomment"> */</em>
+<a name="197" href="#197">197</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> checkUsernameTokenBSPCompliance(
+<a name="198" href="#198">198</a> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef
+<a name="199" href="#199">199</a> ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="200" href="#200">200</a> <strong class="jxr_keyword">if</strong> (!secRef.containsReference()) {
+<a name="201" href="#201">201</a> <em class="jxr_comment">// BSP does not permit using a KeyIdentifier to refer to a U/T</em>
+<a name="202" href="#202">202</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="203" href="#203">203</a> WSSecurityException.FAILED_CHECK, <span class="jxr_string">"unsupportedKeyId"</span>
+<a name="204" href="#204">204</a> );
+<a name="205" href="#205">205</a> }
+<a name="206" href="#206">206</a>
+<a name="207" href="#207">207</a> String valueType = secRef.getReference().getValueType();
+<a name="208" href="#208">208</a> <strong class="jxr_keyword">if</strong> (!WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE.equals(valueType)) {
+<a name="209" href="#209">209</a> <em class="jxr_comment">// BSP says the Reference must have a ValueType of UsernameToken</em>
+<a name="210" href="#210">210</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="211" href="#211">211</a> WSSecurityException.INVALID_SECURITY,
+<a name="212" href="#212">212</a> <span class="jxr_string">"invalidValueType"</span>,
+<a name="213" href="#213">213</a> <strong class="jxr_keyword">new</strong> Object[]{valueType}
+<a name="214" href="#214">214</a> );
+<a name="215" href="#215">215</a> }
+<a name="216" href="#216">216</a> }
+<a name="217" href="#217">217</a>
+<a name="218" href="#218">218</a>
+<a name="219" href="#219">219</a> }
</pre>
<hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
</html>