You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ws.apache.org by co...@apache.org on 2011/10/03 17:16:11 UTC
svn commit: r1178426 [22/40] - in /webservices/wss4j/site: ./ apidocs/
apidocs/org/apache/ws/security/ apidocs/org/apache/ws/security/action/
apidocs/org/apache/ws/security/action/class-use/
apidocs/org/apache/ws/security/class-use/ apidocs/org/apache/...
Modified: webservices/wss4j/site/xref/org/apache/ws/security/WSSConfig.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/WSSConfig.html?rev=1178426&r1=1178425&r2=1178426&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/WSSConfig.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/WSSConfig.html Mon Oct 3 15:15:52 2011
@@ -30,913 +30,943 @@
<a name="20" href="#20">20</a> <strong class="jxr_keyword">package</strong> org.apache.ws.security;
<a name="21" href="#21">21</a>
<a name="22" href="#22">22</a> <strong class="jxr_keyword">import</strong> java.lang.reflect.Field;
-<a name="23" href="#23">23</a> <strong class="jxr_keyword">import</strong> java.security.Provider;
-<a name="24" href="#24">24</a> <strong class="jxr_keyword">import</strong> java.security.Security;
-<a name="25" href="#25">25</a> <strong class="jxr_keyword">import</strong> java.util.HashMap;
-<a name="26" href="#26">26</a> <strong class="jxr_keyword">import</strong> java.util.Map;
-<a name="27" href="#27">27</a>
-<a name="28" href="#28">28</a> <strong class="jxr_keyword">import</strong> javax.xml.namespace.QName;
-<a name="29" href="#29">29</a>
-<a name="30" href="#30">30</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.action.Action;
-<a name="31" href="#31">31</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.processor.Processor;
-<a name="32" href="#32">32</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.Loader;
-<a name="33" href="#33">33</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.UUIDGenerator;
-<a name="34" href="#34">34</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.validate.Validator;
-<a name="35" href="#35">35</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.utils.XMLUtils;
-<a name="36" href="#36">36</a>
-<a name="37" href="#37">37</a> <em class="jxr_javadoccomment">/**</em>
-<a name="38" href="#38">38</a> <em class="jxr_javadoccomment"> * WSSConfig <p/> Carries configuration data so the WSS4J spec compliance can be</em>
-<a name="39" href="#39">39</a> <em class="jxr_javadoccomment"> * modified in runtime. Configure an instance of this object only if you need</em>
-<a name="40" href="#40">40</a> <em class="jxr_javadoccomment"> * WSS4J to emulate certain industry clients or previous OASIS specifications</em>
-<a name="41" href="#41">41</a> <em class="jxr_javadoccomment"> * for WS-Security interoperability testing purposes. <p/> The default settings</em>
-<a name="42" href="#42">42</a> <em class="jxr_javadoccomment"> * follow the latest OASIS and changing anything might violate the OASIS specs.</em>
-<a name="43" href="#43">43</a> <em class="jxr_javadoccomment"> * <p/> <b>WARNING: changing the default settings will break the compliance with</em>
-<a name="44" href="#44">44</a> <em class="jxr_javadoccomment"> * the latest specs. Do this only if you know what you are doing.</b> <p/></em>
-<a name="45" href="#45">45</a> <em class="jxr_javadoccomment"> * </em>
-<a name="46" href="#46">46</a> <em class="jxr_javadoccomment"> * @author Rami Jaamour (rjaamour@parasoft.com)</em>
-<a name="47" href="#47">47</a> <em class="jxr_javadoccomment"> * @author Werner Dittmann (werner@apache.org)</em>
-<a name="48" href="#48">48</a> <em class="jxr_javadoccomment"> */</em>
-<a name="49" href="#49">49</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../org/apache/ws/security/WSSConfig.html">WSSConfig</a> {
-<a name="50" href="#50">50</a>
-<a name="51" href="#51">51</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> org.apache.commons.logging.Log log =
-<a name="52" href="#52">52</a> org.apache.commons.logging.LogFactory.getLog(WSSConfig.<strong class="jxr_keyword">class</strong>);
-<a name="53" href="#53">53</a>
-<a name="54" href="#54">54</a> <em class="jxr_javadoccomment">/**</em>
-<a name="55" href="#55">55</a> <em class="jxr_javadoccomment"> * The default collection of actions supported by the toolkit.</em>
-<a name="56" href="#56">56</a> <em class="jxr_javadoccomment"> */</em>
-<a name="57" href="#57">57</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> Map<Integer, Class<?>> DEFAULT_ACTIONS;
-<a name="58" href="#58">58</a> <strong class="jxr_keyword">static</strong> {
-<a name="59" href="#59">59</a> <strong class="jxr_keyword">final</strong> Map<Integer, Class<?>> tmp = <strong class="jxr_keyword">new</strong> HashMap<Integer, Class<?>>();
-<a name="60" href="#60">60</a> <strong class="jxr_keyword">try</strong> {
-<a name="61" href="#61">61</a> tmp.put(
-<a name="62" href="#62">62</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.UT),
-<a name="63" href="#63">63</a> org.apache.ws.security.action.UsernameTokenAction.<strong class="jxr_keyword">class</strong>
-<a name="64" href="#64">64</a> );
+<a name="23" href="#23">23</a> <strong class="jxr_keyword">import</strong> java.security.AccessController;
+<a name="24" href="#24">24</a> <strong class="jxr_keyword">import</strong> java.security.PrivilegedAction;
+<a name="25" href="#25">25</a> <strong class="jxr_keyword">import</strong> java.security.PrivilegedExceptionAction;
+<a name="26" href="#26">26</a> <strong class="jxr_keyword">import</strong> java.security.Provider;
+<a name="27" href="#27">27</a> <strong class="jxr_keyword">import</strong> java.security.Security;
+<a name="28" href="#28">28</a> <strong class="jxr_keyword">import</strong> java.util.HashMap;
+<a name="29" href="#29">29</a> <strong class="jxr_keyword">import</strong> java.util.Map;
+<a name="30" href="#30">30</a>
+<a name="31" href="#31">31</a> <strong class="jxr_keyword">import</strong> javax.xml.namespace.QName;
+<a name="32" href="#32">32</a>
+<a name="33" href="#33">33</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.action.Action;
+<a name="34" href="#34">34</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.processor.Processor;
+<a name="35" href="#35">35</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.Loader;
+<a name="36" href="#36">36</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.UUIDGenerator;
+<a name="37" href="#37">37</a> <strong class="jxr_keyword">import</strong> org.apache.ws.security.validate.Validator;
+<a name="38" href="#38">38</a> <strong class="jxr_keyword">import</strong> org.apache.xml.security.utils.XMLUtils;
+<a name="39" href="#39">39</a> <strong class="jxr_keyword">import</strong> org.jcp.xml.dsig.internal.dom.XMLDSigRI;
+<a name="40" href="#40">40</a>
+<a name="41" href="#41">41</a> <em class="jxr_javadoccomment">/**</em>
+<a name="42" href="#42">42</a> <em class="jxr_javadoccomment"> * WSSConfig <p/> Carries configuration data so the WSS4J spec compliance can be</em>
+<a name="43" href="#43">43</a> <em class="jxr_javadoccomment"> * modified in runtime. Configure an instance of this object only if you need</em>
+<a name="44" href="#44">44</a> <em class="jxr_javadoccomment"> * WSS4J to emulate certain industry clients or previous OASIS specifications</em>
+<a name="45" href="#45">45</a> <em class="jxr_javadoccomment"> * for WS-Security interoperability testing purposes. <p/> The default settings</em>
+<a name="46" href="#46">46</a> <em class="jxr_javadoccomment"> * follow the latest OASIS and changing anything might violate the OASIS specs.</em>
+<a name="47" href="#47">47</a> <em class="jxr_javadoccomment"> * <p/> <b>WARNING: changing the default settings will break the compliance with</em>
+<a name="48" href="#48">48</a> <em class="jxr_javadoccomment"> * the latest specs. Do this only if you know what you are doing.</b> <p/></em>
+<a name="49" href="#49">49</a> <em class="jxr_javadoccomment"> * </em>
+<a name="50" href="#50">50</a> <em class="jxr_javadoccomment"> * @author Rami Jaamour (rjaamour@parasoft.com)</em>
+<a name="51" href="#51">51</a> <em class="jxr_javadoccomment"> * @author Werner Dittmann (werner@apache.org)</em>
+<a name="52" href="#52">52</a> <em class="jxr_javadoccomment"> */</em>
+<a name="53" href="#53">53</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../org/apache/ws/security/WSSConfig.html">WSSConfig</a> {
+<a name="54" href="#54">54</a>
+<a name="55" href="#55">55</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> org.apache.commons.logging.Log log =
+<a name="56" href="#56">56</a> org.apache.commons.logging.LogFactory.getLog(WSSConfig.<strong class="jxr_keyword">class</strong>);
+<a name="57" href="#57">57</a>
+<a name="58" href="#58">58</a> <em class="jxr_javadoccomment">/**</em>
+<a name="59" href="#59">59</a> <em class="jxr_javadoccomment"> * The default collection of actions supported by the toolkit.</em>
+<a name="60" href="#60">60</a> <em class="jxr_javadoccomment"> */</em>
+<a name="61" href="#61">61</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> Map<Integer, Class<?>> DEFAULT_ACTIONS;
+<a name="62" href="#62">62</a> <strong class="jxr_keyword">static</strong> {
+<a name="63" href="#63">63</a> <strong class="jxr_keyword">final</strong> Map<Integer, Class<?>> tmp = <strong class="jxr_keyword">new</strong> HashMap<Integer, Class<?>>();
+<a name="64" href="#64">64</a> <strong class="jxr_keyword">try</strong> {
<a name="65" href="#65">65</a> tmp.put(
-<a name="66" href="#66">66</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.ENCR),
-<a name="67" href="#67">67</a> org.apache.ws.security.action.EncryptionAction.<strong class="jxr_keyword">class</strong>
+<a name="66" href="#66">66</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.UT),
+<a name="67" href="#67">67</a> org.apache.ws.security.action.UsernameTokenAction.<strong class="jxr_keyword">class</strong>
<a name="68" href="#68">68</a> );
<a name="69" href="#69">69</a> tmp.put(
-<a name="70" href="#70">70</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.SIGN),
-<a name="71" href="#71">71</a> org.apache.ws.security.action.SignatureAction.<strong class="jxr_keyword">class</strong>
+<a name="70" href="#70">70</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.ENCR),
+<a name="71" href="#71">71</a> org.apache.ws.security.action.EncryptionAction.<strong class="jxr_keyword">class</strong>
<a name="72" href="#72">72</a> );
<a name="73" href="#73">73</a> tmp.put(
-<a name="74" href="#74">74</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.ST_SIGNED),
-<a name="75" href="#75">75</a> org.apache.ws.security.action.SAMLTokenSignedAction.<strong class="jxr_keyword">class</strong>
+<a name="74" href="#74">74</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.SIGN),
+<a name="75" href="#75">75</a> org.apache.ws.security.action.SignatureAction.<strong class="jxr_keyword">class</strong>
<a name="76" href="#76">76</a> );
<a name="77" href="#77">77</a> tmp.put(
-<a name="78" href="#78">78</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.ST_UNSIGNED),
-<a name="79" href="#79">79</a> org.apache.ws.security.action.SAMLTokenUnsignedAction.<strong class="jxr_keyword">class</strong>
+<a name="78" href="#78">78</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.ST_SIGNED),
+<a name="79" href="#79">79</a> org.apache.ws.security.action.SAMLTokenSignedAction.<strong class="jxr_keyword">class</strong>
<a name="80" href="#80">80</a> );
<a name="81" href="#81">81</a> tmp.put(
-<a name="82" href="#82">82</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.TS),
-<a name="83" href="#83">83</a> org.apache.ws.security.action.TimestampAction.<strong class="jxr_keyword">class</strong>
+<a name="82" href="#82">82</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.ST_UNSIGNED),
+<a name="83" href="#83">83</a> org.apache.ws.security.action.SAMLTokenUnsignedAction.<strong class="jxr_keyword">class</strong>
<a name="84" href="#84">84</a> );
<a name="85" href="#85">85</a> tmp.put(
-<a name="86" href="#86">86</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.UT_SIGN),
-<a name="87" href="#87">87</a> org.apache.ws.security.action.UsernameTokenSignedAction.<strong class="jxr_keyword">class</strong>
+<a name="86" href="#86">86</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.TS),
+<a name="87" href="#87">87</a> org.apache.ws.security.action.TimestampAction.<strong class="jxr_keyword">class</strong>
<a name="88" href="#88">88</a> );
<a name="89" href="#89">89</a> tmp.put(
-<a name="90" href="#90">90</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.SC),
-<a name="91" href="#91">91</a> org.apache.ws.security.action.SignatureConfirmationAction.<strong class="jxr_keyword">class</strong>
+<a name="90" href="#90">90</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.UT_SIGN),
+<a name="91" href="#91">91</a> org.apache.ws.security.action.UsernameTokenSignedAction.<strong class="jxr_keyword">class</strong>
<a name="92" href="#92">92</a> );
-<a name="93" href="#93">93</a> } <strong class="jxr_keyword">catch</strong> (<strong class="jxr_keyword">final</strong> Throwable t) {
-<a name="94" href="#94">94</a> <strong class="jxr_keyword">if</strong> (log.isDebugEnabled()) {
-<a name="95" href="#95">95</a> log.debug(t.getMessage(), t);
-<a name="96" href="#96">96</a> }
-<a name="97" href="#97">97</a> }
-<a name="98" href="#98">98</a> DEFAULT_ACTIONS = java.util.Collections.unmodifiableMap(tmp);
-<a name="99" href="#99">99</a> }
-<a name="100" href="#100">100</a>
-<a name="101" href="#101">101</a> <em class="jxr_javadoccomment">/**</em>
-<a name="102" href="#102">102</a> <em class="jxr_javadoccomment"> * The default collection of processors supported by the toolkit</em>
-<a name="103" href="#103">103</a> <em class="jxr_javadoccomment"> */</em>
-<a name="104" href="#104">104</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> Map<QName, Class<?>> DEFAULT_PROCESSORS;
-<a name="105" href="#105">105</a> <strong class="jxr_keyword">static</strong> {
-<a name="106" href="#106">106</a> <strong class="jxr_keyword">final</strong> Map<QName, Class<?>> tmp = <strong class="jxr_keyword">new</strong> HashMap<QName, Class<?>>();
-<a name="107" href="#107">107</a> <strong class="jxr_keyword">try</strong> {
-<a name="108" href="#108">108</a> tmp.put(
-<a name="109" href="#109">109</a> WSSecurityEngine.SAML_TOKEN,
-<a name="110" href="#110">110</a> org.apache.ws.security.processor.SAMLTokenProcessor.<strong class="jxr_keyword">class</strong>
-<a name="111" href="#111">111</a> );
+<a name="93" href="#93">93</a> tmp.put(
+<a name="94" href="#94">94</a> <strong class="jxr_keyword">new</strong> Integer(WSConstants.SC),
+<a name="95" href="#95">95</a> org.apache.ws.security.action.SignatureConfirmationAction.<strong class="jxr_keyword">class</strong>
+<a name="96" href="#96">96</a> );
+<a name="97" href="#97">97</a> } <strong class="jxr_keyword">catch</strong> (<strong class="jxr_keyword">final</strong> Throwable t) {
+<a name="98" href="#98">98</a> <strong class="jxr_keyword">if</strong> (log.isDebugEnabled()) {
+<a name="99" href="#99">99</a> log.debug(t.getMessage(), t);
+<a name="100" href="#100">100</a> }
+<a name="101" href="#101">101</a> }
+<a name="102" href="#102">102</a> DEFAULT_ACTIONS = java.util.Collections.unmodifiableMap(tmp);
+<a name="103" href="#103">103</a> }
+<a name="104" href="#104">104</a>
+<a name="105" href="#105">105</a> <em class="jxr_javadoccomment">/**</em>
+<a name="106" href="#106">106</a> <em class="jxr_javadoccomment"> * The default collection of processors supported by the toolkit</em>
+<a name="107" href="#107">107</a> <em class="jxr_javadoccomment"> */</em>
+<a name="108" href="#108">108</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> Map<QName, Class<?>> DEFAULT_PROCESSORS;
+<a name="109" href="#109">109</a> <strong class="jxr_keyword">static</strong> {
+<a name="110" href="#110">110</a> <strong class="jxr_keyword">final</strong> Map<QName, Class<?>> tmp = <strong class="jxr_keyword">new</strong> HashMap<QName, Class<?>>();
+<a name="111" href="#111">111</a> <strong class="jxr_keyword">try</strong> {
<a name="112" href="#112">112</a> tmp.put(
-<a name="113" href="#113">113</a> WSSecurityEngine.SAML2_TOKEN,
+<a name="113" href="#113">113</a> WSSecurityEngine.SAML_TOKEN,
<a name="114" href="#114">114</a> org.apache.ws.security.processor.SAMLTokenProcessor.<strong class="jxr_keyword">class</strong>
<a name="115" href="#115">115</a> );
<a name="116" href="#116">116</a> tmp.put(
-<a name="117" href="#117">117</a> WSSecurityEngine.ENCRYPTED_KEY,
-<a name="118" href="#118">118</a> org.apache.ws.security.processor.EncryptedKeyProcessor.<strong class="jxr_keyword">class</strong>
+<a name="117" href="#117">117</a> WSSecurityEngine.SAML2_TOKEN,
+<a name="118" href="#118">118</a> org.apache.ws.security.processor.SAMLTokenProcessor.<strong class="jxr_keyword">class</strong>
<a name="119" href="#119">119</a> );
<a name="120" href="#120">120</a> tmp.put(
-<a name="121" href="#121">121</a> WSSecurityEngine.SIGNATURE,
-<a name="122" href="#122">122</a> org.apache.ws.security.processor.SignatureProcessor.<strong class="jxr_keyword">class</strong>
+<a name="121" href="#121">121</a> WSSecurityEngine.ENCRYPTED_KEY,
+<a name="122" href="#122">122</a> org.apache.ws.security.processor.EncryptedKeyProcessor.<strong class="jxr_keyword">class</strong>
<a name="123" href="#123">123</a> );
<a name="124" href="#124">124</a> tmp.put(
-<a name="125" href="#125">125</a> WSSecurityEngine.TIMESTAMP,
-<a name="126" href="#126">126</a> org.apache.ws.security.processor.TimestampProcessor.<strong class="jxr_keyword">class</strong>
+<a name="125" href="#125">125</a> WSSecurityEngine.SIGNATURE,
+<a name="126" href="#126">126</a> org.apache.ws.security.processor.SignatureProcessor.<strong class="jxr_keyword">class</strong>
<a name="127" href="#127">127</a> );
<a name="128" href="#128">128</a> tmp.put(
-<a name="129" href="#129">129</a> WSSecurityEngine.USERNAME_TOKEN,
-<a name="130" href="#130">130</a> org.apache.ws.security.processor.UsernameTokenProcessor.<strong class="jxr_keyword">class</strong>
+<a name="129" href="#129">129</a> WSSecurityEngine.TIMESTAMP,
+<a name="130" href="#130">130</a> org.apache.ws.security.processor.TimestampProcessor.<strong class="jxr_keyword">class</strong>
<a name="131" href="#131">131</a> );
<a name="132" href="#132">132</a> tmp.put(
-<a name="133" href="#133">133</a> WSSecurityEngine.REFERENCE_LIST,
-<a name="134" href="#134">134</a> org.apache.ws.security.processor.ReferenceListProcessor.<strong class="jxr_keyword">class</strong>
+<a name="133" href="#133">133</a> WSSecurityEngine.USERNAME_TOKEN,
+<a name="134" href="#134">134</a> org.apache.ws.security.processor.UsernameTokenProcessor.<strong class="jxr_keyword">class</strong>
<a name="135" href="#135">135</a> );
<a name="136" href="#136">136</a> tmp.put(
-<a name="137" href="#137">137</a> WSSecurityEngine.SIGNATURE_CONFIRMATION,
-<a name="138" href="#138">138</a> org.apache.ws.security.processor.SignatureConfirmationProcessor.<strong class="jxr_keyword">class</strong>
+<a name="137" href="#137">137</a> WSSecurityEngine.REFERENCE_LIST,
+<a name="138" href="#138">138</a> org.apache.ws.security.processor.ReferenceListProcessor.<strong class="jxr_keyword">class</strong>
<a name="139" href="#139">139</a> );
<a name="140" href="#140">140</a> tmp.put(
-<a name="141" href="#141">141</a> WSSecurityEngine.DERIVED_KEY_TOKEN_05_02,
-<a name="142" href="#142">142</a> org.apache.ws.security.processor.DerivedKeyTokenProcessor.<strong class="jxr_keyword">class</strong>
+<a name="141" href="#141">141</a> WSSecurityEngine.SIGNATURE_CONFIRMATION,
+<a name="142" href="#142">142</a> org.apache.ws.security.processor.SignatureConfirmationProcessor.<strong class="jxr_keyword">class</strong>
<a name="143" href="#143">143</a> );
<a name="144" href="#144">144</a> tmp.put(
-<a name="145" href="#145">145</a> WSSecurityEngine.DERIVED_KEY_TOKEN_05_12,
-<a name="146" href="#146">146</a> tmp.get(WSSecurityEngine.DERIVED_KEY_TOKEN_05_02)
+<a name="145" href="#145">145</a> WSSecurityEngine.DERIVED_KEY_TOKEN_05_02,
+<a name="146" href="#146">146</a> org.apache.ws.security.processor.DerivedKeyTokenProcessor.<strong class="jxr_keyword">class</strong>
<a name="147" href="#147">147</a> );
<a name="148" href="#148">148</a> tmp.put(
-<a name="149" href="#149">149</a> WSSecurityEngine.SECURITY_CONTEXT_TOKEN_05_02,
-<a name="150" href="#150">150</a> org.apache.ws.security.processor.SecurityContextTokenProcessor.<strong class="jxr_keyword">class</strong>
+<a name="149" href="#149">149</a> WSSecurityEngine.DERIVED_KEY_TOKEN_05_12,
+<a name="150" href="#150">150</a> tmp.get(WSSecurityEngine.DERIVED_KEY_TOKEN_05_02)
<a name="151" href="#151">151</a> );
<a name="152" href="#152">152</a> tmp.put(
-<a name="153" href="#153">153</a> WSSecurityEngine.SECURITY_CONTEXT_TOKEN_05_12,
-<a name="154" href="#154">154</a> tmp.get(WSSecurityEngine.SECURITY_CONTEXT_TOKEN_05_02)
+<a name="153" href="#153">153</a> WSSecurityEngine.SECURITY_CONTEXT_TOKEN_05_02,
+<a name="154" href="#154">154</a> org.apache.ws.security.processor.SecurityContextTokenProcessor.<strong class="jxr_keyword">class</strong>
<a name="155" href="#155">155</a> );
<a name="156" href="#156">156</a> tmp.put(
-<a name="157" href="#157">157</a> WSSecurityEngine.BINARY_TOKEN,
-<a name="158" href="#158">158</a> org.apache.ws.security.processor.BinarySecurityTokenProcessor.<strong class="jxr_keyword">class</strong>
+<a name="157" href="#157">157</a> WSSecurityEngine.SECURITY_CONTEXT_TOKEN_05_12,
+<a name="158" href="#158">158</a> tmp.get(WSSecurityEngine.SECURITY_CONTEXT_TOKEN_05_02)
<a name="159" href="#159">159</a> );
<a name="160" href="#160">160</a> tmp.put(
-<a name="161" href="#161">161</a> WSSecurityEngine.ENCRYPTED_DATA,
-<a name="162" href="#162">162</a> org.apache.ws.security.processor.EncryptedDataProcessor.<strong class="jxr_keyword">class</strong>
+<a name="161" href="#161">161</a> WSSecurityEngine.BINARY_TOKEN,
+<a name="162" href="#162">162</a> org.apache.ws.security.processor.BinarySecurityTokenProcessor.<strong class="jxr_keyword">class</strong>
<a name="163" href="#163">163</a> );
-<a name="164" href="#164">164</a> } <strong class="jxr_keyword">catch</strong> (<strong class="jxr_keyword">final</strong> Throwable t) {
-<a name="165" href="#165">165</a> <strong class="jxr_keyword">if</strong> (log.isDebugEnabled()) {
-<a name="166" href="#166">166</a> log.debug(t.getMessage(), t);
-<a name="167" href="#167">167</a> }
-<a name="168" href="#168">168</a> }
-<a name="169" href="#169">169</a> DEFAULT_PROCESSORS = java.util.Collections.unmodifiableMap(tmp);
-<a name="170" href="#170">170</a> }
-<a name="171" href="#171">171</a>
-<a name="172" href="#172">172</a> <em class="jxr_javadoccomment">/**</em>
-<a name="173" href="#173">173</a> <em class="jxr_javadoccomment"> * The default collection of validators supported by the toolkit</em>
-<a name="174" href="#174">174</a> <em class="jxr_javadoccomment"> */</em>
-<a name="175" href="#175">175</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> Map<QName, Class<?>> DEFAULT_VALIDATORS;
-<a name="176" href="#176">176</a> <strong class="jxr_keyword">static</strong> {
-<a name="177" href="#177">177</a> <strong class="jxr_keyword">final</strong> Map<QName, Class<?>> tmp = <strong class="jxr_keyword">new</strong> HashMap<QName, Class<?>>();
-<a name="178" href="#178">178</a> <strong class="jxr_keyword">try</strong> {
-<a name="179" href="#179">179</a> tmp.put(
-<a name="180" href="#180">180</a> WSSecurityEngine.SAML_TOKEN,
-<a name="181" href="#181">181</a> org.apache.ws.security.validate.SamlAssertionValidator.<strong class="jxr_keyword">class</strong>
-<a name="182" href="#182">182</a> );
+<a name="164" href="#164">164</a> tmp.put(
+<a name="165" href="#165">165</a> WSSecurityEngine.ENCRYPTED_DATA,
+<a name="166" href="#166">166</a> org.apache.ws.security.processor.EncryptedDataProcessor.<strong class="jxr_keyword">class</strong>
+<a name="167" href="#167">167</a> );
+<a name="168" href="#168">168</a> } <strong class="jxr_keyword">catch</strong> (<strong class="jxr_keyword">final</strong> Throwable t) {
+<a name="169" href="#169">169</a> <strong class="jxr_keyword">if</strong> (log.isDebugEnabled()) {
+<a name="170" href="#170">170</a> log.debug(t.getMessage(), t);
+<a name="171" href="#171">171</a> }
+<a name="172" href="#172">172</a> }
+<a name="173" href="#173">173</a> DEFAULT_PROCESSORS = java.util.Collections.unmodifiableMap(tmp);
+<a name="174" href="#174">174</a> }
+<a name="175" href="#175">175</a>
+<a name="176" href="#176">176</a> <em class="jxr_javadoccomment">/**</em>
+<a name="177" href="#177">177</a> <em class="jxr_javadoccomment"> * The default collection of validators supported by the toolkit</em>
+<a name="178" href="#178">178</a> <em class="jxr_javadoccomment"> */</em>
+<a name="179" href="#179">179</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> Map<QName, Class<?>> DEFAULT_VALIDATORS;
+<a name="180" href="#180">180</a> <strong class="jxr_keyword">static</strong> {
+<a name="181" href="#181">181</a> <strong class="jxr_keyword">final</strong> Map<QName, Class<?>> tmp = <strong class="jxr_keyword">new</strong> HashMap<QName, Class<?>>();
+<a name="182" href="#182">182</a> <strong class="jxr_keyword">try</strong> {
<a name="183" href="#183">183</a> tmp.put(
-<a name="184" href="#184">184</a> WSSecurityEngine.SAML2_TOKEN,
+<a name="184" href="#184">184</a> WSSecurityEngine.SAML_TOKEN,
<a name="185" href="#185">185</a> org.apache.ws.security.validate.SamlAssertionValidator.<strong class="jxr_keyword">class</strong>
<a name="186" href="#186">186</a> );
<a name="187" href="#187">187</a> tmp.put(
-<a name="188" href="#188">188</a> WSSecurityEngine.SIGNATURE,
-<a name="189" href="#189">189</a> org.apache.ws.security.validate.SignatureTrustValidator.<strong class="jxr_keyword">class</strong>
+<a name="188" href="#188">188</a> WSSecurityEngine.SAML2_TOKEN,
+<a name="189" href="#189">189</a> org.apache.ws.security.validate.SamlAssertionValidator.<strong class="jxr_keyword">class</strong>
<a name="190" href="#190">190</a> );
<a name="191" href="#191">191</a> tmp.put(
-<a name="192" href="#192">192</a> WSSecurityEngine.TIMESTAMP,
-<a name="193" href="#193">193</a> org.apache.ws.security.validate.TimestampValidator.<strong class="jxr_keyword">class</strong>
+<a name="192" href="#192">192</a> WSSecurityEngine.SIGNATURE,
+<a name="193" href="#193">193</a> org.apache.ws.security.validate.SignatureTrustValidator.<strong class="jxr_keyword">class</strong>
<a name="194" href="#194">194</a> );
<a name="195" href="#195">195</a> tmp.put(
-<a name="196" href="#196">196</a> WSSecurityEngine.USERNAME_TOKEN,
-<a name="197" href="#197">197</a> org.apache.ws.security.validate.UsernameTokenValidator.<strong class="jxr_keyword">class</strong>
+<a name="196" href="#196">196</a> WSSecurityEngine.TIMESTAMP,
+<a name="197" href="#197">197</a> org.apache.ws.security.validate.TimestampValidator.<strong class="jxr_keyword">class</strong>
<a name="198" href="#198">198</a> );
-<a name="199" href="#199">199</a> } <strong class="jxr_keyword">catch</strong> (<strong class="jxr_keyword">final</strong> Throwable t) {
-<a name="200" href="#200">200</a> <strong class="jxr_keyword">if</strong> (log.isDebugEnabled()) {
-<a name="201" href="#201">201</a> log.debug(t.getMessage(), t);
-<a name="202" href="#202">202</a> }
-<a name="203" href="#203">203</a> }
-<a name="204" href="#204">204</a> DEFAULT_VALIDATORS = java.util.Collections.unmodifiableMap(tmp);
-<a name="205" href="#205">205</a> }
-<a name="206" href="#206">206</a>
-<a name="207" href="#207">207</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> wsiBSPCompliant = <strong class="jxr_keyword">true</strong>;
-<a name="208" href="#208">208</a>
-<a name="209" href="#209">209</a> <em class="jxr_javadoccomment">/**</em>
-<a name="210" href="#210">210</a> <em class="jxr_javadoccomment"> * Set the timestamp precision mode. If set to <code>true</code> then use</em>
-<a name="211" href="#211">211</a> <em class="jxr_javadoccomment"> * timestamps with milliseconds, otherwise omit the milliseconds. As per XML</em>
-<a name="212" href="#212">212</a> <em class="jxr_javadoccomment"> * Date/Time specification the default is to include the milliseconds.</em>
-<a name="213" href="#213">213</a> <em class="jxr_javadoccomment"> */</em>
-<a name="214" href="#214">214</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> precisionInMilliSeconds = <strong class="jxr_keyword">true</strong>;
-<a name="215" href="#215">215</a>
-<a name="216" href="#216">216</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> enableSignatureConfirmation = false;
-<a name="217" href="#217">217</a>
-<a name="218" href="#218">218</a> <em class="jxr_javadoccomment">/**</em>
-<a name="219" href="#219">219</a> <em class="jxr_javadoccomment"> * If set to true then the timestamp handling will throw an exception if the</em>
-<a name="220" href="#220">220</a> <em class="jxr_javadoccomment"> * timestamp contains an expires element and the semantics are expired.</em>
-<a name="221" href="#221">221</a> <em class="jxr_javadoccomment"> * </em>
-<a name="222" href="#222">222</a> <em class="jxr_javadoccomment"> * If set to false, no exception will be thrown, even if the semantics are</em>
-<a name="223" href="#223">223</a> <em class="jxr_javadoccomment"> * expired.</em>
-<a name="224" href="#224">224</a> <em class="jxr_javadoccomment"> */</em>
-<a name="225" href="#225">225</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> timeStampStrict = <strong class="jxr_keyword">true</strong>;
-<a name="226" href="#226">226</a>
-<a name="227" href="#227">227</a> <em class="jxr_javadoccomment">/**</em>
-<a name="228" href="#228">228</a> <em class="jxr_javadoccomment"> * If this value is not null, then username token handling will throw an </em>
-<a name="229" href="#229">229</a> <em class="jxr_javadoccomment"> * exception if the password type of the Username Token does not match this value</em>
-<a name="230" href="#230">230</a> <em class="jxr_javadoccomment"> */</em>
-<a name="231" href="#231">231</a> <strong class="jxr_keyword">protected</strong> String requiredPasswordType = <strong class="jxr_keyword">null</strong>;
-<a name="232" href="#232">232</a>
-<a name="233" href="#233">233</a> <em class="jxr_javadoccomment">/**</em>
-<a name="234" href="#234">234</a> <em class="jxr_javadoccomment"> * The time in seconds between creation and expiry for a Timestamp. The default</em>
-<a name="235" href="#235">235</a> <em class="jxr_javadoccomment"> * is 300 seconds (5 minutes).</em>
-<a name="236" href="#236">236</a> <em class="jxr_javadoccomment"> */</em>
-<a name="237" href="#237">237</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">int</strong> timeStampTTL = 300;
-<a name="238" href="#238">238</a>
-<a name="239" href="#239">239</a> <em class="jxr_javadoccomment">/**</em>
-<a name="240" href="#240">240</a> <em class="jxr_javadoccomment"> * The time in seconds in the future within which the Created time of an incoming </em>
-<a name="241" href="#241">241</a> <em class="jxr_javadoccomment"> * Timestamp is valid. The default is 60 seconds.</em>
-<a name="242" href="#242">242</a> <em class="jxr_javadoccomment"> */</em>
-<a name="243" href="#243">243</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">int</strong> timeStampFutureTTL = 60;
-<a name="244" href="#244">244</a>
-<a name="245" href="#245">245</a> <em class="jxr_javadoccomment">/**</em>
-<a name="246" href="#246">246</a> <em class="jxr_javadoccomment"> * This variable controls whether types other than PasswordDigest or PasswordText</em>
-<a name="247" href="#247">247</a> <em class="jxr_javadoccomment"> * are allowed when processing UsernameTokens. </em>
-<a name="248" href="#248">248</a> <em class="jxr_javadoccomment"> * </em>
-<a name="249" href="#249">249</a> <em class="jxr_javadoccomment"> * By default this is set to false so that the user doesn't have to explicitly</em>
-<a name="250" href="#250">250</a> <em class="jxr_javadoccomment"> * reject custom token types in the callback handler.</em>
-<a name="251" href="#251">251</a> <em class="jxr_javadoccomment"> */</em>
-<a name="252" href="#252">252</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> handleCustomPasswordTypes = false;
-<a name="253" href="#253">253</a>
-<a name="254" href="#254">254</a> <em class="jxr_javadoccomment">/**</em>
-<a name="255" href="#255">255</a> <em class="jxr_javadoccomment"> * This variable controls whether (wsse) namespace qualified password types are</em>
-<a name="256" href="#256">256</a> <em class="jxr_javadoccomment"> * accepted when processing UsernameTokens.</em>
-<a name="257" href="#257">257</a> <em class="jxr_javadoccomment"> * </em>
-<a name="258" href="#258">258</a> <em class="jxr_javadoccomment"> * By default this is set to false.</em>
-<a name="259" href="#259">259</a> <em class="jxr_javadoccomment"> */</em>
-<a name="260" href="#260">260</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> allowNamespaceQualifiedPasswordTypes = false;
-<a name="261" href="#261">261</a>
-<a name="262" href="#262">262</a> <em class="jxr_javadoccomment">/**</em>
-<a name="263" href="#263">263</a> <em class="jxr_javadoccomment"> * The secret key length to be used for UT_SIGN.</em>
-<a name="264" href="#264">264</a> <em class="jxr_javadoccomment"> */</em>
-<a name="265" href="#265">265</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">int</strong> secretKeyLength = WSConstants.WSE_DERIVED_KEY_LEN;
-<a name="266" href="#266">266</a>
-<a name="267" href="#267">267</a> <em class="jxr_javadoccomment">/**</em>
-<a name="268" href="#268">268</a> <em class="jxr_javadoccomment"> * Whether the password should be treated as a binary value. This</em>
-<a name="269" href="#269">269</a> <em class="jxr_javadoccomment"> * is needed to properly handle password equivalence for UsernameToken</em>
-<a name="270" href="#270">270</a> <em class="jxr_javadoccomment"> * passwords. Binary passwords are Base64 encoded so they can be</em>
-<a name="271" href="#271">271</a> <em class="jxr_javadoccomment"> * treated as strings in most places, but when the password digest</em>
-<a name="272" href="#272">272</a> <em class="jxr_javadoccomment"> * is calculated or a key is derived from the password, the password</em>
-<a name="273" href="#273">273</a> <em class="jxr_javadoccomment"> * will be Base64 decoded before being used. This is most useful for</em>
-<a name="274" href="#274">274</a> <em class="jxr_javadoccomment"> * hashed passwords as password equivalents.</em>
-<a name="275" href="#275">275</a> <em class="jxr_javadoccomment"> *</em>
-<a name="276" href="#276">276</a> <em class="jxr_javadoccomment"> * See https://issues.apache.org/jira/browse/WSS-239</em>
-<a name="277" href="#277">277</a> <em class="jxr_javadoccomment"> */</em>
-<a name="278" href="#278">278</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> passwordsAreEncoded = false;
-<a name="279" href="#279">279</a>
-<a name="280" href="#280">280</a> <em class="jxr_javadoccomment">/**</em>
-<a name="281" href="#281">281</a> <em class="jxr_javadoccomment"> * The default wsu:Id allocator is a simple "start at 1 and increment up"</em>
-<a name="282" href="#282">282</a> <em class="jxr_javadoccomment"> * thing that is very fast.</em>
-<a name="283" href="#283">283</a> <em class="jxr_javadoccomment"> */</em>
-<a name="284" href="#284">284</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../org/apache/ws/security/WsuIdAllocator.html">WsuIdAllocator</a> DEFAULT_ID_ALLOCATOR = <strong class="jxr_keyword">new</strong> <a href="../../../../org/apache/ws/security/WsuIdAllocator.html">WsuIdAllocator</a>() {
-<a name="285" href="#285">285</a> <strong class="jxr_keyword">int</strong> i;
-<a name="286" href="#286">286</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">synchronized</strong> String next() {
-<a name="287" href="#287">287</a> <strong class="jxr_keyword">return</strong> Integer.toString(++i);
-<a name="288" href="#288">288</a> }
-<a name="289" href="#289">289</a> <strong class="jxr_keyword">public</strong> String createId(String prefix, Object o) {
-<a name="290" href="#290">290</a> <strong class="jxr_keyword">if</strong> (prefix == <strong class="jxr_keyword">null</strong>) {
-<a name="291" href="#291">291</a> <strong class="jxr_keyword">return</strong> next();
-<a name="292" href="#292">292</a> }
-<a name="293" href="#293">293</a> <strong class="jxr_keyword">return</strong> prefix + next();
-<a name="294" href="#294">294</a> }
-<a name="295" href="#295">295</a>
-<a name="296" href="#296">296</a> <strong class="jxr_keyword">public</strong> String createSecureId(String prefix, Object o) {
-<a name="297" href="#297">297</a> <strong class="jxr_keyword">if</strong> (prefix == <strong class="jxr_keyword">null</strong>) {
-<a name="298" href="#298">298</a> <strong class="jxr_keyword">return</strong> UUIDGenerator.getUUID();
-<a name="299" href="#299">299</a> }
-<a name="300" href="#300">300</a> <strong class="jxr_keyword">return</strong> prefix + UUIDGenerator.getUUID();
-<a name="301" href="#301">301</a> }
-<a name="302" href="#302">302</a> };
-<a name="303" href="#303">303</a> <strong class="jxr_keyword">protected</strong> <a href="../../../../org/apache/ws/security/WsuIdAllocator.html">WsuIdAllocator</a> idAllocator = DEFAULT_ID_ALLOCATOR;
-<a name="304" href="#304">304</a>
-<a name="305" href="#305">305</a> <em class="jxr_javadoccomment">/**</em>
-<a name="306" href="#306">306</a> <em class="jxr_javadoccomment"> * The known actions. This map is of the form <Integer, Class<?>> or </em>
-<a name="307" href="#307">307</a> <em class="jxr_javadoccomment"> * <Integer, Action>. </em>
-<a name="308" href="#308">308</a> <em class="jxr_javadoccomment"> * The known actions are initialized from a set of defaults,</em>
-<a name="309" href="#309">309</a> <em class="jxr_javadoccomment"> * but the list may be modified via the setAction operations.</em>
-<a name="310" href="#310">310</a> <em class="jxr_javadoccomment"> */</em>
-<a name="311" href="#311">311</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">final</strong> Map<Integer, Object> actionMap =
-<a name="312" href="#312">312</a> <strong class="jxr_keyword">new</strong> HashMap<Integer, Object>(DEFAULT_ACTIONS);
-<a name="313" href="#313">313</a>
-<a name="314" href="#314">314</a> <em class="jxr_javadoccomment">/**</em>
-<a name="315" href="#315">315</a> <em class="jxr_javadoccomment"> * The known processors. This map is of the form <QName, Class<?>> or</em>
-<a name="316" href="#316">316</a> <em class="jxr_javadoccomment"> * <QName, Processor>.</em>
-<a name="317" href="#317">317</a> <em class="jxr_javadoccomment"> * The known processors are initialized from a set of defaults,</em>
-<a name="318" href="#318">318</a> <em class="jxr_javadoccomment"> * but the list may be modified via the setProcessor operations.</em>
-<a name="319" href="#319">319</a> <em class="jxr_javadoccomment"> */</em>
-<a name="320" href="#320">320</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">final</strong> Map<QName, Object> processorMap =
-<a name="321" href="#321">321</a> <strong class="jxr_keyword">new</strong> HashMap<QName, Object>(DEFAULT_PROCESSORS);
-<a name="322" href="#322">322</a>
-<a name="323" href="#323">323</a> <em class="jxr_javadoccomment">/**</em>
-<a name="324" href="#324">324</a> <em class="jxr_javadoccomment"> * The known validators. This map is of the form <QName, Class<?>> or</em>
-<a name="325" href="#325">325</a> <em class="jxr_javadoccomment"> * <QName, Validator>.</em>
-<a name="326" href="#326">326</a> <em class="jxr_javadoccomment"> * The known validators are initialized from a set of defaults,</em>
-<a name="327" href="#327">327</a> <em class="jxr_javadoccomment"> * but the list may be modified via the setValidator operations.</em>
-<a name="328" href="#328">328</a> <em class="jxr_javadoccomment"> */</em>
-<a name="329" href="#329">329</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">final</strong> Map<QName, Object> validatorMap =
-<a name="330" href="#330">330</a> <strong class="jxr_keyword">new</strong> HashMap<QName, Object>(DEFAULT_VALIDATORS);
-<a name="331" href="#331">331</a>
-<a name="332" href="#332">332</a> <em class="jxr_javadoccomment">/**</em>
-<a name="333" href="#333">333</a> <em class="jxr_javadoccomment"> * a static boolean flag that determines whether default JCE providers</em>
-<a name="334" href="#334">334</a> <em class="jxr_javadoccomment"> * should be added at the time of construction.</em>
-<a name="335" href="#335">335</a> <em class="jxr_javadoccomment"> *</em>
-<a name="336" href="#336">336</a> <em class="jxr_javadoccomment"> * These providers, and the order in which they are added, can interfere</em>
-<a name="337" href="#337">337</a> <em class="jxr_javadoccomment"> * with some JVMs (such as IBMs).</em>
-<a name="338" href="#338">338</a> <em class="jxr_javadoccomment"> */</em>
-<a name="339" href="#339">339</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">boolean</strong> addJceProviders = <strong class="jxr_keyword">true</strong>;
-<a name="340" href="#340">340</a>
-<a name="341" href="#341">341</a> <em class="jxr_javadoccomment">/**</em>
-<a name="342" href="#342">342</a> <em class="jxr_javadoccomment"> * a boolean flag to record whether we have already been statically</em>
-<a name="343" href="#343">343</a> <em class="jxr_javadoccomment"> * initialized. This flag prevents repeated and unnecessary calls</em>
-<a name="344" href="#344">344</a> <em class="jxr_javadoccomment"> * to static initialization code at construction time.</em>
-<a name="345" href="#345">345</a> <em class="jxr_javadoccomment"> */</em>
-<a name="346" href="#346">346</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">boolean</strong> staticallyInitialized = false;
-<a name="347" href="#347">347</a>
-<a name="348" href="#348">348</a> <em class="jxr_javadoccomment">/**</em>
-<a name="349" href="#349">349</a> <em class="jxr_javadoccomment"> * Set the value of the internal addJceProviders flag. This flag</em>
-<a name="350" href="#350">350</a> <em class="jxr_javadoccomment"> * turns on (or off) automatic registration of known JCE providers</em>
-<a name="351" href="#351">351</a> <em class="jxr_javadoccomment"> * that provide necessary cryptographic algorithms for use with WSS4J.</em>
-<a name="352" href="#352">352</a> <em class="jxr_javadoccomment"> * By default, this flag is true. You may wish (or need) to initialize </em>
-<a name="353" href="#353">353</a> <em class="jxr_javadoccomment"> * the JCE manually, e.g., in some JVMs.</em>
-<a name="354" href="#354">354</a> <em class="jxr_javadoccomment"> */</em>
-<a name="355" href="#355">355</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> setAddJceProviders(<strong class="jxr_keyword">boolean</strong> value) {
-<a name="356" href="#356">356</a> addJceProviders = value;
-<a name="357" href="#357">357</a> }
-<a name="358" href="#358">358</a>
-<a name="359" href="#359">359</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> setXmlSecIgnoreLineBreak() {
-<a name="360" href="#360">360</a> <em class="jxr_comment">//really need to make sure ignoreLineBreaks is set to</em>
-<a name="361" href="#361">361</a> <strong class="jxr_keyword">boolean</strong> wasSet = false;
-<a name="362" href="#362">362</a> <strong class="jxr_keyword">try</strong> {
-<a name="363" href="#363">363</a> <em class="jxr_comment">// Don't override if it was set explicitly</em>
-<a name="364" href="#364">364</a> String lineBreakPropName = <span class="jxr_string">"org.apache.xml.security.ignoreLineBreaks"</span>;
-<a name="365" href="#365">365</a> <strong class="jxr_keyword">if</strong> (System.getProperty(lineBreakPropName) == <strong class="jxr_keyword">null</strong>) {
-<a name="366" href="#366">366</a> System.setProperty(lineBreakPropName, <span class="jxr_string">"true"</span>);
-<a name="367" href="#367">367</a> } <strong class="jxr_keyword">else</strong> {
-<a name="368" href="#368">368</a> wasSet = <strong class="jxr_keyword">true</strong>;
-<a name="369" href="#369">369</a> }
-<a name="370" href="#370">370</a> } <strong class="jxr_keyword">catch</strong> (Throwable t) { <em class="jxr_comment">//NOPMD</em>
-<a name="371" href="#371">371</a> <em class="jxr_comment">//ignore</em>
-<a name="372" href="#372">372</a> }
-<a name="373" href="#373">373</a> org.apache.xml.security.Init.init();
-<a name="374" href="#374">374</a> <strong class="jxr_keyword">if</strong> (!wasSet) {
-<a name="375" href="#375">375</a> <strong class="jxr_keyword">try</strong> {
-<a name="376" href="#376">376</a> Field f = XMLUtils.<strong class="jxr_keyword">class</strong>.getDeclaredField(<span class="jxr_string">"ignoreLineBreaks"</span>);
-<a name="377" href="#377">377</a> f.setAccessible(<strong class="jxr_keyword">true</strong>);
-<a name="378" href="#378">378</a> f.set(<strong class="jxr_keyword">null</strong>, Boolean.TRUE);
-<a name="379" href="#379">379</a> } <strong class="jxr_keyword">catch</strong> (Throwable t) { <em class="jxr_comment">//NOPMD</em>
-<a name="380" href="#380">380</a> <em class="jxr_comment">//ignore</em>
-<a name="381" href="#381">381</a> }
-<a name="382" href="#382">382</a> }
-<a name="383" href="#383">383</a> }
-<a name="384" href="#384">384</a>
-<a name="385" href="#385">385</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">synchronized</strong> <strong class="jxr_keyword">void</strong> init() {
-<a name="386" href="#386">386</a> <strong class="jxr_keyword">if</strong> (!staticallyInitialized) {
-<a name="387" href="#387">387</a> setXmlSecIgnoreLineBreak();
-<a name="388" href="#388">388</a> <strong class="jxr_keyword">if</strong> (addJceProviders) {
-<a name="389" href="#389">389</a> addJceProvider(<span class="jxr_string">"XMLDSig"</span>, <span class="jxr_string">"org.jcp.xml.dsig.internal.dom.XMLDSigRI"</span>);
-<a name="390" href="#390">390</a> addJceProvider(<span class="jxr_string">"BC"</span>, <span class="jxr_string">"org.bouncycastle.jce.provider.BouncyCastleProvider"</span>);
-<a name="391" href="#391">391</a> Security.removeProvider(<span class="jxr_string">"STRTransform"</span>);
-<a name="392" href="#392">392</a> appendJceProvider(
-<a name="393" href="#393">393</a> <span class="jxr_string">"STRTransform"</span>, <strong class="jxr_keyword">new</strong> org.apache.ws.security.transform.STRTransformProvider()
-<a name="394" href="#394">394</a> );
-<a name="395" href="#395">395</a> }
-<a name="396" href="#396">396</a> staticallyInitialized = <strong class="jxr_keyword">true</strong>;
-<a name="397" href="#397">397</a> }
-<a name="398" href="#398">398</a> }
-<a name="399" href="#399">399</a>
-<a name="400" href="#400">400</a> <em class="jxr_javadoccomment">/**</em>
-<a name="401" href="#401">401</a> <em class="jxr_javadoccomment"> * @return a new WSSConfig instance configured with the default values</em>
-<a name="402" href="#402">402</a> <em class="jxr_javadoccomment"> */</em>
-<a name="403" href="#403">403</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../org/apache/ws/security/WSSConfig.html">WSSConfig</a> getNewInstance() {
-<a name="404" href="#404">404</a> init();
-<a name="405" href="#405">405</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../org/apache/ws/security/WSSConfig.html">WSSConfig</a>();
-<a name="406" href="#406">406</a> }
-<a name="407" href="#407">407</a>
-<a name="408" href="#408">408</a> <em class="jxr_javadoccomment">/**</em>
-<a name="409" href="#409">409</a> <em class="jxr_javadoccomment"> * Checks if we are in WS-I Basic Security Profile compliance mode</em>
-<a name="410" href="#410">410</a> <em class="jxr_javadoccomment"> * </em>
-<a name="411" href="#411">411</a> <em class="jxr_javadoccomment"> * @return whether we are in WS-I Basic Security Profile compliance mode</em>
-<a name="412" href="#412">412</a> <em class="jxr_javadoccomment"> */</em>
-<a name="413" href="#413">413</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> isWsiBSPCompliant() {
-<a name="414" href="#414">414</a> <strong class="jxr_keyword">return</strong> wsiBSPCompliant;
-<a name="415" href="#415">415</a> }
-<a name="416" href="#416">416</a>
-<a name="417" href="#417">417</a> <em class="jxr_javadoccomment">/**</em>
-<a name="418" href="#418">418</a> <em class="jxr_javadoccomment"> * Set the WS-I Basic Security Profile compliance mode. The default is false</em>
-<a name="419" href="#419">419</a> <em class="jxr_javadoccomment"> * (dues to .Net interop problems).</em>
-<a name="420" href="#420">420</a> <em class="jxr_javadoccomment"> * </em>
-<a name="421" href="#421">421</a> <em class="jxr_javadoccomment"> * @param wsiBSPCompliant</em>
-<a name="422" href="#422">422</a> <em class="jxr_javadoccomment"> */</em>
-<a name="423" href="#423">423</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setWsiBSPCompliant(<strong class="jxr_keyword">boolean</strong> wsiBSPCompliant) {
-<a name="424" href="#424">424</a> <strong class="jxr_keyword">this</strong>.wsiBSPCompliant = wsiBSPCompliant;
-<a name="425" href="#425">425</a> }
-<a name="426" href="#426">426</a>
-<a name="427" href="#427">427</a> <em class="jxr_javadoccomment">/**</em>
-<a name="428" href="#428">428</a> <em class="jxr_javadoccomment"> * Checks if we need to use milliseconds in timestamps</em>
-<a name="429" href="#429">429</a> <em class="jxr_javadoccomment"> * </em>
-<a name="430" href="#430">430</a> <em class="jxr_javadoccomment"> * @return whether to use precision in milliseconds for timestamps</em>
-<a name="431" href="#431">431</a> <em class="jxr_javadoccomment"> */</em>
-<a name="432" href="#432">432</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> isPrecisionInMilliSeconds() {
-<a name="433" href="#433">433</a> <strong class="jxr_keyword">return</strong> precisionInMilliSeconds;
-<a name="434" href="#434">434</a> }
-<a name="435" href="#435">435</a>
-<a name="436" href="#436">436</a> <em class="jxr_javadoccomment">/**</em>
-<a name="437" href="#437">437</a> <em class="jxr_javadoccomment"> * Set the precision in milliseconds for timestamps</em>
-<a name="438" href="#438">438</a> <em class="jxr_javadoccomment"> * </em>
-<a name="439" href="#439">439</a> <em class="jxr_javadoccomment"> * @param precisionInMilliSeconds whether to use precision in milliseconds for timestamps</em>
-<a name="440" href="#440">440</a> <em class="jxr_javadoccomment"> */</em>
-<a name="441" href="#441">441</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setPrecisionInMilliSeconds(<strong class="jxr_keyword">boolean</strong> precisionInMilliSeconds) {
-<a name="442" href="#442">442</a> <strong class="jxr_keyword">this</strong>.precisionInMilliSeconds = precisionInMilliSeconds;
-<a name="443" href="#443">443</a> }
-<a name="444" href="#444">444</a>
-<a name="445" href="#445">445</a> <em class="jxr_javadoccomment">/**</em>
-<a name="446" href="#446">446</a> <em class="jxr_javadoccomment"> * @return Returns the enableSignatureConfirmation.</em>
-<a name="447" href="#447">447</a> <em class="jxr_javadoccomment"> */</em>
-<a name="448" href="#448">448</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> isEnableSignatureConfirmation() {
-<a name="449" href="#449">449</a> <strong class="jxr_keyword">return</strong> enableSignatureConfirmation;
-<a name="450" href="#450">450</a> }
-<a name="451" href="#451">451</a>
-<a name="452" href="#452">452</a> <em class="jxr_javadoccomment">/**</em>
-<a name="453" href="#453">453</a> <em class="jxr_javadoccomment"> * @param enableSignatureConfirmation</em>
-<a name="454" href="#454">454</a> <em class="jxr_javadoccomment"> * The enableSignatureConfirmation to set.</em>
-<a name="455" href="#455">455</a> <em class="jxr_javadoccomment"> */</em>
-<a name="456" href="#456">456</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setEnableSignatureConfirmation(<strong class="jxr_keyword">boolean</strong> enableSignatureConfirmation) {
-<a name="457" href="#457">457</a> <strong class="jxr_keyword">this</strong>.enableSignatureConfirmation = enableSignatureConfirmation;
-<a name="458" href="#458">458</a> }
-<a name="459" href="#459">459</a>
-<a name="460" href="#460">460</a> <em class="jxr_javadoccomment">/**</em>
-<a name="461" href="#461">461</a> <em class="jxr_javadoccomment"> * @param handleCustomTypes </em>
-<a name="462" href="#462">462</a> <em class="jxr_javadoccomment"> * whether to handle custom UsernameToken password types or not</em>
-<a name="463" href="#463">463</a> <em class="jxr_javadoccomment"> */</em>
-<a name="464" href="#464">464</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setHandleCustomPasswordTypes(<strong class="jxr_keyword">boolean</strong> handleCustomTypes) {
-<a name="465" href="#465">465</a> <strong class="jxr_keyword">this</strong>.handleCustomPasswordTypes = handleCustomTypes;
-<a name="466" href="#466">466</a> }
-<a name="467" href="#467">467</a>
-<a name="468" href="#468">468</a> <em class="jxr_javadoccomment">/**</em>
-<a name="469" href="#469">469</a> <em class="jxr_javadoccomment"> * @return whether custom UsernameToken password types are allowed or not</em>
+<a name="199" href="#199">199</a> tmp.put(
+<a name="200" href="#200">200</a> WSSecurityEngine.USERNAME_TOKEN,
+<a name="201" href="#201">201</a> org.apache.ws.security.validate.UsernameTokenValidator.<strong class="jxr_keyword">class</strong>
+<a name="202" href="#202">202</a> );
+<a name="203" href="#203">203</a> } <strong class="jxr_keyword">catch</strong> (<strong class="jxr_keyword">final</strong> Throwable t) {
+<a name="204" href="#204">204</a> <strong class="jxr_keyword">if</strong> (log.isDebugEnabled()) {
+<a name="205" href="#205">205</a> log.debug(t.getMessage(), t);
+<a name="206" href="#206">206</a> }
+<a name="207" href="#207">207</a> }
+<a name="208" href="#208">208</a> DEFAULT_VALIDATORS = java.util.Collections.unmodifiableMap(tmp);
+<a name="209" href="#209">209</a> }
+<a name="210" href="#210">210</a>
+<a name="211" href="#211">211</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> wsiBSPCompliant = <strong class="jxr_keyword">true</strong>;
+<a name="212" href="#212">212</a>
+<a name="213" href="#213">213</a> <em class="jxr_javadoccomment">/**</em>
+<a name="214" href="#214">214</a> <em class="jxr_javadoccomment"> * Set the timestamp precision mode. If set to <code>true</code> then use</em>
+<a name="215" href="#215">215</a> <em class="jxr_javadoccomment"> * timestamps with milliseconds, otherwise omit the milliseconds. As per XML</em>
+<a name="216" href="#216">216</a> <em class="jxr_javadoccomment"> * Date/Time specification the default is to include the milliseconds.</em>
+<a name="217" href="#217">217</a> <em class="jxr_javadoccomment"> */</em>
+<a name="218" href="#218">218</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> precisionInMilliSeconds = <strong class="jxr_keyword">true</strong>;
+<a name="219" href="#219">219</a>
+<a name="220" href="#220">220</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> enableSignatureConfirmation = false;
+<a name="221" href="#221">221</a>
+<a name="222" href="#222">222</a> <em class="jxr_javadoccomment">/**</em>
+<a name="223" href="#223">223</a> <em class="jxr_javadoccomment"> * If set to true then the timestamp handling will throw an exception if the</em>
+<a name="224" href="#224">224</a> <em class="jxr_javadoccomment"> * timestamp contains an expires element and the semantics are expired.</em>
+<a name="225" href="#225">225</a> <em class="jxr_javadoccomment"> * </em>
+<a name="226" href="#226">226</a> <em class="jxr_javadoccomment"> * If set to false, no exception will be thrown, even if the semantics are</em>
+<a name="227" href="#227">227</a> <em class="jxr_javadoccomment"> * expired.</em>
+<a name="228" href="#228">228</a> <em class="jxr_javadoccomment"> */</em>
+<a name="229" href="#229">229</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> timeStampStrict = <strong class="jxr_keyword">true</strong>;
+<a name="230" href="#230">230</a>
+<a name="231" href="#231">231</a> <em class="jxr_javadoccomment">/**</em>
+<a name="232" href="#232">232</a> <em class="jxr_javadoccomment"> * If this value is not null, then username token handling will throw an </em>
+<a name="233" href="#233">233</a> <em class="jxr_javadoccomment"> * exception if the password type of the Username Token does not match this value</em>
+<a name="234" href="#234">234</a> <em class="jxr_javadoccomment"> */</em>
+<a name="235" href="#235">235</a> <strong class="jxr_keyword">protected</strong> String requiredPasswordType = <strong class="jxr_keyword">null</strong>;
+<a name="236" href="#236">236</a>
+<a name="237" href="#237">237</a> <em class="jxr_javadoccomment">/**</em>
+<a name="238" href="#238">238</a> <em class="jxr_javadoccomment"> * The time in seconds between creation and expiry for a Timestamp. The default</em>
+<a name="239" href="#239">239</a> <em class="jxr_javadoccomment"> * is 300 seconds (5 minutes).</em>
+<a name="240" href="#240">240</a> <em class="jxr_javadoccomment"> */</em>
+<a name="241" href="#241">241</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">int</strong> timeStampTTL = 300;
+<a name="242" href="#242">242</a>
+<a name="243" href="#243">243</a> <em class="jxr_javadoccomment">/**</em>
+<a name="244" href="#244">244</a> <em class="jxr_javadoccomment"> * The time in seconds in the future within which the Created time of an incoming </em>
+<a name="245" href="#245">245</a> <em class="jxr_javadoccomment"> * Timestamp is valid. The default is 60 seconds.</em>
+<a name="246" href="#246">246</a> <em class="jxr_javadoccomment"> */</em>
+<a name="247" href="#247">247</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">int</strong> timeStampFutureTTL = 60;
+<a name="248" href="#248">248</a>
+<a name="249" href="#249">249</a> <em class="jxr_javadoccomment">/**</em>
+<a name="250" href="#250">250</a> <em class="jxr_javadoccomment"> * This variable controls whether types other than PasswordDigest or PasswordText</em>
+<a name="251" href="#251">251</a> <em class="jxr_javadoccomment"> * are allowed when processing UsernameTokens. </em>
+<a name="252" href="#252">252</a> <em class="jxr_javadoccomment"> * </em>
+<a name="253" href="#253">253</a> <em class="jxr_javadoccomment"> * By default this is set to false so that the user doesn't have to explicitly</em>
+<a name="254" href="#254">254</a> <em class="jxr_javadoccomment"> * reject custom token types in the callback handler.</em>
+<a name="255" href="#255">255</a> <em class="jxr_javadoccomment"> */</em>
+<a name="256" href="#256">256</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> handleCustomPasswordTypes = false;
+<a name="257" href="#257">257</a>
+<a name="258" href="#258">258</a> <em class="jxr_javadoccomment">/**</em>
+<a name="259" href="#259">259</a> <em class="jxr_javadoccomment"> * This variable controls whether (wsse) namespace qualified password types are</em>
+<a name="260" href="#260">260</a> <em class="jxr_javadoccomment"> * accepted when processing UsernameTokens.</em>
+<a name="261" href="#261">261</a> <em class="jxr_javadoccomment"> * </em>
+<a name="262" href="#262">262</a> <em class="jxr_javadoccomment"> * By default this is set to false.</em>
+<a name="263" href="#263">263</a> <em class="jxr_javadoccomment"> */</em>
+<a name="264" href="#264">264</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> allowNamespaceQualifiedPasswordTypes = false;
+<a name="265" href="#265">265</a>
+<a name="266" href="#266">266</a> <em class="jxr_javadoccomment">/**</em>
+<a name="267" href="#267">267</a> <em class="jxr_javadoccomment"> * The secret key length to be used for UT_SIGN.</em>
+<a name="268" href="#268">268</a> <em class="jxr_javadoccomment"> */</em>
+<a name="269" href="#269">269</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">int</strong> secretKeyLength = WSConstants.WSE_DERIVED_KEY_LEN;
+<a name="270" href="#270">270</a>
+<a name="271" href="#271">271</a> <em class="jxr_javadoccomment">/**</em>
+<a name="272" href="#272">272</a> <em class="jxr_javadoccomment"> * Whether the password should be treated as a binary value. This</em>
+<a name="273" href="#273">273</a> <em class="jxr_javadoccomment"> * is needed to properly handle password equivalence for UsernameToken</em>
+<a name="274" href="#274">274</a> <em class="jxr_javadoccomment"> * passwords. Binary passwords are Base64 encoded so they can be</em>
+<a name="275" href="#275">275</a> <em class="jxr_javadoccomment"> * treated as strings in most places, but when the password digest</em>
+<a name="276" href="#276">276</a> <em class="jxr_javadoccomment"> * is calculated or a key is derived from the password, the password</em>
+<a name="277" href="#277">277</a> <em class="jxr_javadoccomment"> * will be Base64 decoded before being used. This is most useful for</em>
+<a name="278" href="#278">278</a> <em class="jxr_javadoccomment"> * hashed passwords as password equivalents.</em>
+<a name="279" href="#279">279</a> <em class="jxr_javadoccomment"> *</em>
+<a name="280" href="#280">280</a> <em class="jxr_javadoccomment"> * See https://issues.apache.org/jira/browse/WSS-239</em>
+<a name="281" href="#281">281</a> <em class="jxr_javadoccomment"> */</em>
+<a name="282" href="#282">282</a> <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">boolean</strong> passwordsAreEncoded = false;
+<a name="283" href="#283">283</a>
+<a name="284" href="#284">284</a> <em class="jxr_javadoccomment">/**</em>
+<a name="285" href="#285">285</a> <em class="jxr_javadoccomment"> * The default wsu:Id allocator is a simple "start at 1 and increment up"</em>
+<a name="286" href="#286">286</a> <em class="jxr_javadoccomment"> * thing that is very fast.</em>
+<a name="287" href="#287">287</a> <em class="jxr_javadoccomment"> */</em>
+<a name="288" href="#288">288</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../org/apache/ws/security/WsuIdAllocator.html">WsuIdAllocator</a> DEFAULT_ID_ALLOCATOR = <strong class="jxr_keyword">new</strong> <a href="../../../../org/apache/ws/security/WsuIdAllocator.html">WsuIdAllocator</a>() {
+<a name="289" href="#289">289</a> <strong class="jxr_keyword">int</strong> i;
+<a name="290" href="#290">290</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">synchronized</strong> String next() {
+<a name="291" href="#291">291</a> <strong class="jxr_keyword">return</strong> Integer.toString(++i);
+<a name="292" href="#292">292</a> }
+<a name="293" href="#293">293</a> <strong class="jxr_keyword">public</strong> String createId(String prefix, Object o) {
+<a name="294" href="#294">294</a> <strong class="jxr_keyword">if</strong> (prefix == <strong class="jxr_keyword">null</strong>) {
+<a name="295" href="#295">295</a> <strong class="jxr_keyword">return</strong> next();
+<a name="296" href="#296">296</a> }
+<a name="297" href="#297">297</a> <strong class="jxr_keyword">return</strong> prefix + next();
+<a name="298" href="#298">298</a> }
+<a name="299" href="#299">299</a>
+<a name="300" href="#300">300</a> <strong class="jxr_keyword">public</strong> String createSecureId(String prefix, Object o) {
+<a name="301" href="#301">301</a> <strong class="jxr_keyword">if</strong> (prefix == <strong class="jxr_keyword">null</strong>) {
+<a name="302" href="#302">302</a> <strong class="jxr_keyword">return</strong> UUIDGenerator.getUUID();
+<a name="303" href="#303">303</a> }
+<a name="304" href="#304">304</a> <strong class="jxr_keyword">return</strong> prefix + UUIDGenerator.getUUID();
+<a name="305" href="#305">305</a> }
+<a name="306" href="#306">306</a> };
+<a name="307" href="#307">307</a> <strong class="jxr_keyword">protected</strong> <a href="../../../../org/apache/ws/security/WsuIdAllocator.html">WsuIdAllocator</a> idAllocator = DEFAULT_ID_ALLOCATOR;
+<a name="308" href="#308">308</a>
+<a name="309" href="#309">309</a> <em class="jxr_javadoccomment">/**</em>
+<a name="310" href="#310">310</a> <em class="jxr_javadoccomment"> * The known actions. This map is of the form <Integer, Class<?>> or </em>
+<a name="311" href="#311">311</a> <em class="jxr_javadoccomment"> * <Integer, Action>. </em>
+<a name="312" href="#312">312</a> <em class="jxr_javadoccomment"> * The known actions are initialized from a set of defaults,</em>
+<a name="313" href="#313">313</a> <em class="jxr_javadoccomment"> * but the list may be modified via the setAction operations.</em>
+<a name="314" href="#314">314</a> <em class="jxr_javadoccomment"> */</em>
+<a name="315" href="#315">315</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">final</strong> Map<Integer, Object> actionMap =
+<a name="316" href="#316">316</a> <strong class="jxr_keyword">new</strong> HashMap<Integer, Object>(DEFAULT_ACTIONS);
+<a name="317" href="#317">317</a>
+<a name="318" href="#318">318</a> <em class="jxr_javadoccomment">/**</em>
+<a name="319" href="#319">319</a> <em class="jxr_javadoccomment"> * The known processors. This map is of the form <QName, Class<?>> or</em>
+<a name="320" href="#320">320</a> <em class="jxr_javadoccomment"> * <QName, Processor>.</em>
+<a name="321" href="#321">321</a> <em class="jxr_javadoccomment"> * The known processors are initialized from a set of defaults,</em>
+<a name="322" href="#322">322</a> <em class="jxr_javadoccomment"> * but the list may be modified via the setProcessor operations.</em>
+<a name="323" href="#323">323</a> <em class="jxr_javadoccomment"> */</em>
+<a name="324" href="#324">324</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">final</strong> Map<QName, Object> processorMap =
+<a name="325" href="#325">325</a> <strong class="jxr_keyword">new</strong> HashMap<QName, Object>(DEFAULT_PROCESSORS);
+<a name="326" href="#326">326</a>
+<a name="327" href="#327">327</a> <em class="jxr_javadoccomment">/**</em>
+<a name="328" href="#328">328</a> <em class="jxr_javadoccomment"> * The known validators. This map is of the form <QName, Class<?>> or</em>
+<a name="329" href="#329">329</a> <em class="jxr_javadoccomment"> * <QName, Validator>.</em>
+<a name="330" href="#330">330</a> <em class="jxr_javadoccomment"> * The known validators are initialized from a set of defaults,</em>
+<a name="331" href="#331">331</a> <em class="jxr_javadoccomment"> * but the list may be modified via the setValidator operations.</em>
+<a name="332" href="#332">332</a> <em class="jxr_javadoccomment"> */</em>
+<a name="333" href="#333">333</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">final</strong> Map<QName, Object> validatorMap =
+<a name="334" href="#334">334</a> <strong class="jxr_keyword">new</strong> HashMap<QName, Object>(DEFAULT_VALIDATORS);
+<a name="335" href="#335">335</a>
+<a name="336" href="#336">336</a> <em class="jxr_javadoccomment">/**</em>
+<a name="337" href="#337">337</a> <em class="jxr_javadoccomment"> * a static boolean flag that determines whether default JCE providers</em>
+<a name="338" href="#338">338</a> <em class="jxr_javadoccomment"> * should be added at the time of construction.</em>
+<a name="339" href="#339">339</a> <em class="jxr_javadoccomment"> *</em>
+<a name="340" href="#340">340</a> <em class="jxr_javadoccomment"> * These providers, and the order in which they are added, can interfere</em>
+<a name="341" href="#341">341</a> <em class="jxr_javadoccomment"> * with some JVMs (such as IBMs).</em>
+<a name="342" href="#342">342</a> <em class="jxr_javadoccomment"> */</em>
+<a name="343" href="#343">343</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">boolean</strong> addJceProviders = <strong class="jxr_keyword">true</strong>;
+<a name="344" href="#344">344</a>
+<a name="345" href="#345">345</a> <em class="jxr_javadoccomment">/**</em>
+<a name="346" href="#346">346</a> <em class="jxr_javadoccomment"> * a boolean flag to record whether we have already been statically</em>
+<a name="347" href="#347">347</a> <em class="jxr_javadoccomment"> * initialized. This flag prevents repeated and unnecessary calls</em>
+<a name="348" href="#348">348</a> <em class="jxr_javadoccomment"> * to static initialization code at construction time.</em>
+<a name="349" href="#349">349</a> <em class="jxr_javadoccomment"> */</em>
+<a name="350" href="#350">350</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">boolean</strong> staticallyInitialized = false;
+<a name="351" href="#351">351</a>
+<a name="352" href="#352">352</a> <em class="jxr_javadoccomment">/**</em>
+<a name="353" href="#353">353</a> <em class="jxr_javadoccomment"> * Set the value of the internal addJceProviders flag. This flag</em>
+<a name="354" href="#354">354</a> <em class="jxr_javadoccomment"> * turns on (or off) automatic registration of known JCE providers</em>
+<a name="355" href="#355">355</a> <em class="jxr_javadoccomment"> * that provide necessary cryptographic algorithms for use with WSS4J.</em>
+<a name="356" href="#356">356</a> <em class="jxr_javadoccomment"> * By default, this flag is true. You may wish (or need) to initialize </em>
+<a name="357" href="#357">357</a> <em class="jxr_javadoccomment"> * the JCE manually, e.g., in some JVMs.</em>
+<a name="358" href="#358">358</a> <em class="jxr_javadoccomment"> */</em>
+<a name="359" href="#359">359</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> setAddJceProviders(<strong class="jxr_keyword">boolean</strong> value) {
+<a name="360" href="#360">360</a> addJceProviders = value;
+<a name="361" href="#361">361</a> }
+<a name="362" href="#362">362</a>
+<a name="363" href="#363">363</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> setXmlSecIgnoreLineBreak() {
+<a name="364" href="#364">364</a> <em class="jxr_comment">//really need to make sure ignoreLineBreaks is set to</em>
+<a name="365" href="#365">365</a> <strong class="jxr_keyword">boolean</strong> wasSet = false;
+<a name="366" href="#366">366</a> <strong class="jxr_keyword">try</strong> {
+<a name="367" href="#367">367</a> <em class="jxr_comment">// Don't override if it was set explicitly</em>
+<a name="368" href="#368">368</a> wasSet = AccessController.doPrivileged(<strong class="jxr_keyword">new</strong> PrivilegedAction<Boolean>() {
+<a name="369" href="#369">369</a> <strong class="jxr_keyword">public</strong> Boolean run() {
+<a name="370" href="#370">370</a> String lineBreakPropName = <span class="jxr_string">"org.apache.xml.security.ignoreLineBreaks"</span>;
+<a name="371" href="#371">371</a> <strong class="jxr_keyword">if</strong> (System.getProperty(lineBreakPropName) == <strong class="jxr_keyword">null</strong>) {
+<a name="372" href="#372">372</a> System.setProperty(lineBreakPropName, <span class="jxr_string">"true"</span>);
+<a name="373" href="#373">373</a> <strong class="jxr_keyword">return</strong> false;
+<a name="374" href="#374">374</a> }
+<a name="375" href="#375">375</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">true</strong>;
+<a name="376" href="#376">376</a> }
+<a name="377" href="#377">377</a> });
+<a name="378" href="#378">378</a> } <strong class="jxr_keyword">catch</strong> (Throwable t) { <em class="jxr_comment">//NOPMD</em>
+<a name="379" href="#379">379</a> <em class="jxr_comment">//ignore</em>
+<a name="380" href="#380">380</a> }
+<a name="381" href="#381">381</a> org.apache.xml.security.Init.init();
+<a name="382" href="#382">382</a> <strong class="jxr_keyword">if</strong> (!wasSet) {
+<a name="383" href="#383">383</a> <strong class="jxr_keyword">try</strong> {
+<a name="384" href="#384">384</a> AccessController.doPrivileged(<strong class="jxr_keyword">new</strong> PrivilegedExceptionAction<Boolean>() {
+<a name="385" href="#385">385</a> <strong class="jxr_keyword">public</strong> Boolean run() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="386" href="#386">386</a> Field f = XMLUtils.<strong class="jxr_keyword">class</strong>.getDeclaredField(<span class="jxr_string">"ignoreLineBreaks"</span>);
+<a name="387" href="#387">387</a> f.setAccessible(<strong class="jxr_keyword">true</strong>);
+<a name="388" href="#388">388</a> f.set(<strong class="jxr_keyword">null</strong>, Boolean.TRUE);
+<a name="389" href="#389">389</a> <strong class="jxr_keyword">return</strong> false;
+<a name="390" href="#390">390</a> }
+<a name="391" href="#391">391</a> });
+<a name="392" href="#392">392</a> } <strong class="jxr_keyword">catch</strong> (Throwable t) { <em class="jxr_comment">//NOPMD</em>
+<a name="393" href="#393">393</a> <em class="jxr_comment">//ignore</em>
+<a name="394" href="#394">394</a> }
+<a name="395" href="#395">395</a> }
+<a name="396" href="#396">396</a> }
+<a name="397" href="#397">397</a>
+<a name="398" href="#398">398</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">synchronized</strong> <strong class="jxr_keyword">void</strong> init() {
+<a name="399" href="#399">399</a> <strong class="jxr_keyword">if</strong> (!staticallyInitialized) {
+<a name="400" href="#400">400</a> setXmlSecIgnoreLineBreak();
+<a name="401" href="#401">401</a> <strong class="jxr_keyword">if</strong> (addJceProviders) {
+<a name="402" href="#402">402</a> AccessController.doPrivileged(<strong class="jxr_keyword">new</strong> PrivilegedAction<Boolean>() {
+<a name="403" href="#403">403</a> <strong class="jxr_keyword">public</strong> Boolean run() {
+<a name="404" href="#404">404</a> addXMLDSigRI();
+<a name="405" href="#405">405</a> addJceProvider(<span class="jxr_string">"BC"</span>, <span class="jxr_string">"org.bouncycastle.jce.provider.BouncyCastleProvider"</span>);
+<a name="406" href="#406">406</a> Security.removeProvider(<span class="jxr_string">"STRTransform"</span>);
+<a name="407" href="#407">407</a> appendJceProvider(
+<a name="408" href="#408">408</a> <span class="jxr_string">"STRTransform"</span>, <strong class="jxr_keyword">new</strong> org.apache.ws.security.transform.STRTransformProvider()
+<a name="409" href="#409">409</a> );
+<a name="410" href="#410">410</a>
+<a name="411" href="#411">411</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">true</strong>;
+<a name="412" href="#412">412</a> }
+<a name="413" href="#413">413</a> });
+<a name="414" href="#414">414</a> }
+<a name="415" href="#415">415</a> staticallyInitialized = <strong class="jxr_keyword">true</strong>;
+<a name="416" href="#416">416</a> }
+<a name="417" href="#417">417</a> }
+<a name="418" href="#418">418</a>
+<a name="419" href="#419">419</a> <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> addXMLDSigRI() {
+<a name="420" href="#420">420</a> <strong class="jxr_keyword">try</strong> {
+<a name="421" href="#421">421</a> addXMLDSigRIInternal();
+<a name="422" href="#422">422</a> } <strong class="jxr_keyword">catch</strong> (Throwable t) {
+<a name="423" href="#423">423</a> <em class="jxr_comment">//ignore - may be a NoClassDefFound if XMLDSigRI isn't avail</em>
+<a name="424" href="#424">424</a> <strong class="jxr_keyword">return</strong>;
+<a name="425" href="#425">425</a> }
+<a name="426" href="#426">426</a> }
+<a name="427" href="#427">427</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">void</strong> addXMLDSigRIInternal() {
+<a name="428" href="#428">428</a> addJceProvider(<span class="jxr_string">"XMLDSig"</span>, <strong class="jxr_keyword">new</strong> XMLDSigRI());
+<a name="429" href="#429">429</a> }
+<a name="430" href="#430">430</a>
+<a name="431" href="#431">431</a> <em class="jxr_javadoccomment">/**</em>
+<a name="432" href="#432">432</a> <em class="jxr_javadoccomment"> * @return a new WSSConfig instance configured with the default values</em>
+<a name="433" href="#433">433</a> <em class="jxr_javadoccomment"> */</em>
+<a name="434" href="#434">434</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../org/apache/ws/security/WSSConfig.html">WSSConfig</a> getNewInstance() {
+<a name="435" href="#435">435</a> init();
+<a name="436" href="#436">436</a> <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../org/apache/ws/security/WSSConfig.html">WSSConfig</a>();
+<a name="437" href="#437">437</a> }
+<a name="438" href="#438">438</a>
+<a name="439" href="#439">439</a> <em class="jxr_javadoccomment">/**</em>
+<a name="440" href="#440">440</a> <em class="jxr_javadoccomment"> * Checks if we are in WS-I Basic Security Profile compliance mode</em>
+<a name="441" href="#441">441</a> <em class="jxr_javadoccomment"> * </em>
+<a name="442" href="#442">442</a> <em class="jxr_javadoccomment"> * @return whether we are in WS-I Basic Security Profile compliance mode</em>
+<a name="443" href="#443">443</a> <em class="jxr_javadoccomment"> */</em>
+<a name="444" href="#444">444</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> isWsiBSPCompliant() {
+<a name="445" href="#445">445</a> <strong class="jxr_keyword">return</strong> wsiBSPCompliant;
+<a name="446" href="#446">446</a> }
+<a name="447" href="#447">447</a>
+<a name="448" href="#448">448</a> <em class="jxr_javadoccomment">/**</em>
+<a name="449" href="#449">449</a> <em class="jxr_javadoccomment"> * Set the WS-I Basic Security Profile compliance mode. The default is true.</em>
+<a name="450" href="#450">450</a> <em class="jxr_javadoccomment"> * </em>
+<a name="451" href="#451">451</a> <em class="jxr_javadoccomment"> * @param wsiBSPCompliant</em>
+<a name="452" href="#452">452</a> <em class="jxr_javadoccomment"> */</em>
+<a name="453" href="#453">453</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setWsiBSPCompliant(<strong class="jxr_keyword">boolean</strong> wsiBSPCompliant) {
+<a name="454" href="#454">454</a> <strong class="jxr_keyword">this</strong>.wsiBSPCompliant = wsiBSPCompliant;
+<a name="455" href="#455">455</a> }
+<a name="456" href="#456">456</a>
+<a name="457" href="#457">457</a> <em class="jxr_javadoccomment">/**</em>
+<a name="458" href="#458">458</a> <em class="jxr_javadoccomment"> * Checks if we need to use milliseconds in timestamps</em>
+<a name="459" href="#459">459</a> <em class="jxr_javadoccomment"> * </em>
+<a name="460" href="#460">460</a> <em class="jxr_javadoccomment"> * @return whether to use precision in milliseconds for timestamps</em>
+<a name="461" href="#461">461</a> <em class="jxr_javadoccomment"> */</em>
+<a name="462" href="#462">462</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> isPrecisionInMilliSeconds() {
+<a name="463" href="#463">463</a> <strong class="jxr_keyword">return</strong> precisionInMilliSeconds;
+<a name="464" href="#464">464</a> }
+<a name="465" href="#465">465</a>
+<a name="466" href="#466">466</a> <em class="jxr_javadoccomment">/**</em>
+<a name="467" href="#467">467</a> <em class="jxr_javadoccomment"> * Set the precision in milliseconds for timestamps</em>
+<a name="468" href="#468">468</a> <em class="jxr_javadoccomment"> * </em>
+<a name="469" href="#469">469</a> <em class="jxr_javadoccomment"> * @param precisionInMilliSeconds whether to use precision in milliseconds for timestamps</em>
<a name="470" href="#470">470</a> <em class="jxr_javadoccomment"> */</em>
-<a name="471" href="#471">471</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> getHandleCustomPasswordTypes() {
-<a name="472" href="#472">472</a> <strong class="jxr_keyword">return</strong> handleCustomPasswordTypes;
+<a name="471" href="#471">471</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setPrecisionInMilliSeconds(<strong class="jxr_keyword">boolean</strong> precisionInMilliSeconds) {
+<a name="472" href="#472">472</a> <strong class="jxr_keyword">this</strong>.precisionInMilliSeconds = precisionInMilliSeconds;
[... 920 lines stripped ...]