You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ws.apache.org by co...@apache.org on 2012/12/04 13:49:58 UTC

svn commit: r1416918 [41/47] - in /webservices/wss4j/site: ./ apidocs/ apidocs/org/apache/ws/security/ apidocs/org/apache/ws/security/action/ apidocs/org/apache/ws/security/action/class-use/ apidocs/org/apache/ws/security/cache/ apidocs/org/apache/ws/s...

Modified: webservices/wss4j/site/xref/org/apache/ws/security/processor/SAMLTokenProcessor.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/processor/SAMLTokenProcessor.html?rev=1416918&r1=1416917&r2=1416918&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/processor/SAMLTokenProcessor.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/processor/SAMLTokenProcessor.html Tue Dec  4 12:48:10 2012
@@ -34,103 +34,173 @@
 <a name="24" href="#24">24</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSDocInfo;
 <a name="25" href="#25">25</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityEngineResult;
 <a name="26" href="#26">26</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityException;
-<a name="27" href="#27">27</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.handler.RequestData;
-<a name="28" href="#28">28</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.ext.AssertionWrapper;
-<a name="29" href="#29">29</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.DOM2Writer;
-<a name="30" href="#30">30</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.validate.Credential;
-<a name="31" href="#31">31</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.validate.Validator;
-<a name="32" href="#32">32</a>  
-<a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
-<a name="34" href="#34">34</a>  
-<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> java.util.List;
-<a name="36" href="#36">36</a>  <strong class="jxr_keyword">import</strong> javax.xml.namespace.QName;
-<a name="37" href="#37">37</a>  
-<a name="38" href="#38">38</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/processor/SAMLTokenProcessor.html">SAMLTokenProcessor</a> implements <a href="../../../../../org/apache/ws/security/processor/Processor.html">Processor</a> {
-<a name="39" href="#39">39</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> org.apache.commons.logging.Log log = 
-<a name="40" href="#40">40</a>          org.apache.commons.logging.LogFactory.getLog(SAMLTokenProcessor.<strong class="jxr_keyword">class</strong>);
-<a name="41" href="#41">41</a>      
-<a name="42" href="#42">42</a>      <strong class="jxr_keyword">public</strong> List&lt;WSSecurityEngineResult&gt; handleToken(
-<a name="43" href="#43">43</a>          Element elem, 
-<a name="44" href="#44">44</a>          <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data, 
-<a name="45" href="#45">45</a>          <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo 
-<a name="46" href="#46">46</a>      ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="47" href="#47">47</a>          <strong class="jxr_keyword">if</strong> (log.isDebugEnabled()) {
-<a name="48" href="#48">48</a>              log.debug(<span class="jxr_string">"Found SAML Assertion element"</span>);
-<a name="49" href="#49">49</a>          }
-<a name="50" href="#50">50</a>          
-<a name="51" href="#51">51</a>          <a href="../../../../../org/apache/ws/security/validate/Validator.html">Validator</a> validator = 
-<a name="52" href="#52">52</a>              data.getValidator(<strong class="jxr_keyword">new</strong> QName(elem.getNamespaceURI(), elem.getLocalName()));
-<a name="53" href="#53">53</a>          <a href="../../../../../org/apache/ws/security/validate/Credential.html">Credential</a> credential = handleSAMLToken(elem, data, validator, wsDocInfo);
-<a name="54" href="#54">54</a>          <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion = credential.getAssertion();
-<a name="55" href="#55">55</a>          <strong class="jxr_keyword">if</strong> (log.isDebugEnabled()) {
-<a name="56" href="#56">56</a>              log.debug(<span class="jxr_string">"SAML Assertion issuer "</span> + assertion.getIssuerString());
-<a name="57" href="#57">57</a>              log.debug(DOM2Writer.nodeToString(elem));
-<a name="58" href="#58">58</a>          }
-<a name="59" href="#59">59</a>          
-<a name="60" href="#60">60</a>          <em class="jxr_comment">// See if the token has been previously processed</em>
-<a name="61" href="#61">61</a>          String id = assertion.getId();
-<a name="62" href="#62">62</a>          Element foundElement = wsDocInfo.getTokenElement(id);
-<a name="63" href="#63">63</a>          <strong class="jxr_keyword">if</strong> (elem.equals(foundElement)) {
-<a name="64" href="#64">64</a>              <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a> result = wsDocInfo.getResult(id);
-<a name="65" href="#65">65</a>              <strong class="jxr_keyword">return</strong> java.util.Collections.singletonList(result);
-<a name="66" href="#66">66</a>          } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (foundElement != <strong class="jxr_keyword">null</strong>) {
-<a name="67" href="#67">67</a>              <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="68" href="#68">68</a>                  WSSecurityException.INVALID_SECURITY_TOKEN, <span class="jxr_string">"duplicateError"</span>
-<a name="69" href="#69">69</a>              );
-<a name="70" href="#70">70</a>          }
-<a name="71" href="#71">71</a>  
-<a name="72" href="#72">72</a>          wsDocInfo.addTokenElement(elem);
-<a name="73" href="#73">73</a>          <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a> result = <strong class="jxr_keyword">null</strong>;
-<a name="74" href="#74">74</a>          <strong class="jxr_keyword">if</strong> (assertion.isSigned()) {
-<a name="75" href="#75">75</a>              result = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a>(WSConstants.ST_SIGNED, assertion);
-<a name="76" href="#76">76</a>          } <strong class="jxr_keyword">else</strong> {
-<a name="77" href="#77">77</a>              result = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a>(WSConstants.ST_UNSIGNED, assertion);
-<a name="78" href="#78">78</a>          }
-<a name="79" href="#79">79</a>          
-<a name="80" href="#80">80</a>          result.put(WSSecurityEngineResult.TAG_ID, assertion.getId());
-<a name="81" href="#81">81</a>  
-<a name="82" href="#82">82</a>          <strong class="jxr_keyword">if</strong> (validator != <strong class="jxr_keyword">null</strong>) {
-<a name="83" href="#83">83</a>              result.put(WSSecurityEngineResult.TAG_VALIDATED_TOKEN, Boolean.TRUE);
-<a name="84" href="#84">84</a>              <strong class="jxr_keyword">if</strong> (credential.getTransformedToken() != <strong class="jxr_keyword">null</strong>) {
-<a name="85" href="#85">85</a>                  result.put(
-<a name="86" href="#86">86</a>                      WSSecurityEngineResult.TAG_TRANSFORMED_TOKEN, credential.getTransformedToken()
-<a name="87" href="#87">87</a>                  );
-<a name="88" href="#88">88</a>                  <a href="../../../../../org/apache/ws/security/SAMLTokenPrincipal.html">SAMLTokenPrincipal</a> samlPrincipal = 
-<a name="89" href="#89">89</a>                      <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/SAMLTokenPrincipal.html">SAMLTokenPrincipal</a>(credential.getTransformedToken());
-<a name="90" href="#90">90</a>                  result.put(WSSecurityEngineResult.TAG_PRINCIPAL, samlPrincipal);
-<a name="91" href="#91">91</a>              } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (credential.getPrincipal() != <strong class="jxr_keyword">null</strong>) {
-<a name="92" href="#92">92</a>                  result.put(WSSecurityEngineResult.TAG_PRINCIPAL, credential.getPrincipal());
-<a name="93" href="#93">93</a>              } <strong class="jxr_keyword">else</strong> {
-<a name="94" href="#94">94</a>                  result.put(WSSecurityEngineResult.TAG_PRINCIPAL, <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/SAMLTokenPrincipal.html">SAMLTokenPrincipal</a>(assertion));
-<a name="95" href="#95">95</a>              }
-<a name="96" href="#96">96</a>          }
-<a name="97" href="#97">97</a>          wsDocInfo.addResult(result);
-<a name="98" href="#98">98</a>          <strong class="jxr_keyword">return</strong> java.util.Collections.singletonList(result);
-<a name="99" href="#99">99</a>      }
-<a name="100" href="#100">100</a> 
-<a name="101" href="#101">101</a>     <strong class="jxr_keyword">public</strong> <a href="../../../../../org/apache/ws/security/validate/Credential.html">Credential</a> handleSAMLToken(
-<a name="102" href="#102">102</a>         Element token, 
-<a name="103" href="#103">103</a>         <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data,
-<a name="104" href="#104">104</a>         <a href="../../../../../org/apache/ws/security/validate/Validator.html">Validator</a> validator,
-<a name="105" href="#105">105</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo
-<a name="106" href="#106">106</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="107" href="#107">107</a>         <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>(token);
-<a name="108" href="#108">108</a>         <strong class="jxr_keyword">if</strong> (assertion.isSigned()) {
-<a name="109" href="#109">109</a>             assertion.verifySignature(data, docInfo);
-<a name="110" href="#110">110</a>         }
-<a name="111" href="#111">111</a>         <em class="jxr_comment">// Parse the HOK subject if it exists</em>
-<a name="112" href="#112">112</a>         assertion.parseHOKSubject(data, docInfo);
-<a name="113" href="#113">113</a>             
-<a name="114" href="#114">114</a>         <em class="jxr_comment">// Now delegate the rest of the verification to the Validator</em>
-<a name="115" href="#115">115</a>         <a href="../../../../../org/apache/ws/security/validate/Credential.html">Credential</a> credential = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/validate/Credential.html">Credential</a>();
-<a name="116" href="#116">116</a>         credential.setAssertion(assertion);
-<a name="117" href="#117">117</a>         <strong class="jxr_keyword">if</strong> (validator != <strong class="jxr_keyword">null</strong>) {
-<a name="118" href="#118">118</a>             <strong class="jxr_keyword">return</strong> validator.validate(credential, data);
-<a name="119" href="#119">119</a>         }
-<a name="120" href="#120">120</a>         <strong class="jxr_keyword">return</strong> credential;
-<a name="121" href="#121">121</a>     }
-<a name="122" href="#122">122</a> 
-<a name="123" href="#123">123</a> }
+<a name="27" href="#27">27</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.components.crypto.AlgorithmSuite;
+<a name="28" href="#28">28</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.components.crypto.AlgorithmSuiteValidator;
+<a name="29" href="#29">29</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.handler.RequestData;
+<a name="30" href="#30">30</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.SAMLKeyInfo;
+<a name="31" href="#31">31</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.SAMLUtil;
+<a name="32" href="#32">32</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.ext.AssertionWrapper;
+<a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.DOM2Writer;
+<a name="34" href="#34">34</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.validate.Credential;
+<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.validate.Validator;
+<a name="36" href="#36">36</a>  
+<a name="37" href="#37">37</a>  <strong class="jxr_keyword">import</strong> org.opensaml.xml.signature.KeyInfo;
+<a name="38" href="#38">38</a>  <strong class="jxr_keyword">import</strong> org.opensaml.xml.signature.Signature;
+<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
+<a name="40" href="#40">40</a>  
+<a name="41" href="#41">41</a>  <strong class="jxr_keyword">import</strong> java.security.NoSuchProviderException;
+<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> java.security.PublicKey;
+<a name="43" href="#43">43</a>  <strong class="jxr_keyword">import</strong> java.util.List;
+<a name="44" href="#44">44</a>  
+<a name="45" href="#45">45</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.MarshalException;
+<a name="46" href="#46">46</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.XMLSignature;
+<a name="47" href="#47">47</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.XMLSignatureFactory;
+<a name="48" href="#48">48</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.XMLValidateContext;
+<a name="49" href="#49">49</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.dom.DOMValidateContext;
+<a name="50" href="#50">50</a>  <strong class="jxr_keyword">import</strong> javax.xml.namespace.QName;
+<a name="51" href="#51">51</a>  
+<a name="52" href="#52">52</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/processor/SAMLTokenProcessor.html">SAMLTokenProcessor</a> implements <a href="../../../../../org/apache/ws/security/processor/Processor.html">Processor</a> {
+<a name="53" href="#53">53</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> org.apache.commons.logging.Log log = 
+<a name="54" href="#54">54</a>          org.apache.commons.logging.LogFactory.getLog(SAMLTokenProcessor.<strong class="jxr_keyword">class</strong>);
+<a name="55" href="#55">55</a>      <strong class="jxr_keyword">private</strong> XMLSignatureFactory signatureFactory;
+<a name="56" href="#56">56</a>  
+<a name="57" href="#57">57</a>      <strong class="jxr_keyword">public</strong> <a href="../../../../../org/apache/ws/security/processor/SAMLTokenProcessor.html">SAMLTokenProcessor</a>() {
+<a name="58" href="#58">58</a>          <em class="jxr_comment">// Try to install the Santuario Provider - fall back to the JDK provider if this does</em>
+<a name="59" href="#59">59</a>          <em class="jxr_comment">// not work</em>
+<a name="60" href="#60">60</a>          <strong class="jxr_keyword">try</strong> {
+<a name="61" href="#61">61</a>              signatureFactory = XMLSignatureFactory.getInstance(<span class="jxr_string">"DOM"</span>, <span class="jxr_string">"ApacheXMLDSig"</span>);
+<a name="62" href="#62">62</a>          } <strong class="jxr_keyword">catch</strong> (NoSuchProviderException ex) {
+<a name="63" href="#63">63</a>              signatureFactory = XMLSignatureFactory.getInstance(<span class="jxr_string">"DOM"</span>);
+<a name="64" href="#64">64</a>          }
+<a name="65" href="#65">65</a>      }
+<a name="66" href="#66">66</a>  
+<a name="67" href="#67">67</a>      <strong class="jxr_keyword">public</strong> List&lt;WSSecurityEngineResult&gt; handleToken(
+<a name="68" href="#68">68</a>          Element elem, 
+<a name="69" href="#69">69</a>          <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data, 
+<a name="70" href="#70">70</a>          <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo 
+<a name="71" href="#71">71</a>      ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="72" href="#72">72</a>          <strong class="jxr_keyword">if</strong> (log.isDebugEnabled()) {
+<a name="73" href="#73">73</a>              log.debug(<span class="jxr_string">"Found SAML Assertion element"</span>);
+<a name="74" href="#74">74</a>          }
+<a name="75" href="#75">75</a>          
+<a name="76" href="#76">76</a>          <a href="../../../../../org/apache/ws/security/validate/Validator.html">Validator</a> validator = 
+<a name="77" href="#77">77</a>              data.getValidator(<strong class="jxr_keyword">new</strong> QName(elem.getNamespaceURI(), elem.getLocalName()));
+<a name="78" href="#78">78</a>          <a href="../../../../../org/apache/ws/security/validate/Credential.html">Credential</a> credential = handleSAMLToken(elem, data, validator, wsDocInfo);
+<a name="79" href="#79">79</a>          <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion = credential.getAssertion();
+<a name="80" href="#80">80</a>          <strong class="jxr_keyword">if</strong> (log.isDebugEnabled()) {
+<a name="81" href="#81">81</a>              log.debug(<span class="jxr_string">"SAML Assertion issuer "</span> + assertion.getIssuerString());
+<a name="82" href="#82">82</a>              log.debug(DOM2Writer.nodeToString(elem));
+<a name="83" href="#83">83</a>          }
+<a name="84" href="#84">84</a>          
+<a name="85" href="#85">85</a>          <em class="jxr_comment">// See if the token has been previously processed</em>
+<a name="86" href="#86">86</a>          String id = assertion.getId();
+<a name="87" href="#87">87</a>          Element foundElement = wsDocInfo.getTokenElement(id);
+<a name="88" href="#88">88</a>          <strong class="jxr_keyword">if</strong> (elem.equals(foundElement)) {
+<a name="89" href="#89">89</a>              <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a> result = wsDocInfo.getResult(id);
+<a name="90" href="#90">90</a>              <strong class="jxr_keyword">return</strong> java.util.Collections.singletonList(result);
+<a name="91" href="#91">91</a>          } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (foundElement != <strong class="jxr_keyword">null</strong>) {
+<a name="92" href="#92">92</a>              <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="93" href="#93">93</a>                  WSSecurityException.INVALID_SECURITY_TOKEN, <span class="jxr_string">"duplicateError"</span>
+<a name="94" href="#94">94</a>              );
+<a name="95" href="#95">95</a>          }
+<a name="96" href="#96">96</a>  
+<a name="97" href="#97">97</a>          wsDocInfo.addTokenElement(elem);
+<a name="98" href="#98">98</a>          <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a> result = <strong class="jxr_keyword">null</strong>;
+<a name="99" href="#99">99</a>          <strong class="jxr_keyword">if</strong> (assertion.isSigned()) {
+<a name="100" href="#100">100</a>             result = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a>(WSConstants.ST_SIGNED, assertion);
+<a name="101" href="#101">101</a>         } <strong class="jxr_keyword">else</strong> {
+<a name="102" href="#102">102</a>             result = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a>(WSConstants.ST_UNSIGNED, assertion);
+<a name="103" href="#103">103</a>         }
+<a name="104" href="#104">104</a>         
+<a name="105" href="#105">105</a>         result.put(WSSecurityEngineResult.TAG_ID, assertion.getId());
+<a name="106" href="#106">106</a> 
+<a name="107" href="#107">107</a>         <strong class="jxr_keyword">if</strong> (validator != <strong class="jxr_keyword">null</strong>) {
+<a name="108" href="#108">108</a>             result.put(WSSecurityEngineResult.TAG_VALIDATED_TOKEN, Boolean.TRUE);
+<a name="109" href="#109">109</a>             <strong class="jxr_keyword">if</strong> (credential.getTransformedToken() != <strong class="jxr_keyword">null</strong>) {
+<a name="110" href="#110">110</a>                 result.put(
+<a name="111" href="#111">111</a>                     WSSecurityEngineResult.TAG_TRANSFORMED_TOKEN, credential.getTransformedToken()
+<a name="112" href="#112">112</a>                 );
+<a name="113" href="#113">113</a>                 <a href="../../../../../org/apache/ws/security/SAMLTokenPrincipal.html">SAMLTokenPrincipal</a> samlPrincipal = 
+<a name="114" href="#114">114</a>                     <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/SAMLTokenPrincipal.html">SAMLTokenPrincipal</a>(credential.getTransformedToken());
+<a name="115" href="#115">115</a>                 result.put(WSSecurityEngineResult.TAG_PRINCIPAL, samlPrincipal);
+<a name="116" href="#116">116</a>             } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (credential.getPrincipal() != <strong class="jxr_keyword">null</strong>) {
+<a name="117" href="#117">117</a>                 result.put(WSSecurityEngineResult.TAG_PRINCIPAL, credential.getPrincipal());
+<a name="118" href="#118">118</a>             } <strong class="jxr_keyword">else</strong> {
+<a name="119" href="#119">119</a>                 result.put(WSSecurityEngineResult.TAG_PRINCIPAL, <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/SAMLTokenPrincipal.html">SAMLTokenPrincipal</a>(assertion));
+<a name="120" href="#120">120</a>             }
+<a name="121" href="#121">121</a>         }
+<a name="122" href="#122">122</a>         wsDocInfo.addResult(result);
+<a name="123" href="#123">123</a>         <strong class="jxr_keyword">return</strong> java.util.Collections.singletonList(result);
+<a name="124" href="#124">124</a>     }
+<a name="125" href="#125">125</a> 
+<a name="126" href="#126">126</a>     <strong class="jxr_keyword">public</strong> <a href="../../../../../org/apache/ws/security/validate/Credential.html">Credential</a> handleSAMLToken(
+<a name="127" href="#127">127</a>         Element token, 
+<a name="128" href="#128">128</a>         <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data,
+<a name="129" href="#129">129</a>         <a href="../../../../../org/apache/ws/security/validate/Validator.html">Validator</a> validator,
+<a name="130" href="#130">130</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo
+<a name="131" href="#131">131</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="132" href="#132">132</a>         <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>(token);
+<a name="133" href="#133">133</a>         <strong class="jxr_keyword">if</strong> (assertion.isSigned()) {
+<a name="134" href="#134">134</a>             <em class="jxr_comment">// Check for compliance against the defined AlgorithmSuite</em>
+<a name="135" href="#135">135</a>             <a href="../../../../../org/apache/ws/security/components/crypto/AlgorithmSuite.html">AlgorithmSuite</a> algorithmSuite = data.getSamlAlgorithmSuite();
+<a name="136" href="#136">136</a>             
+<a name="137" href="#137">137</a>             Signature sig = assertion.getSignature();
+<a name="138" href="#138">138</a>             KeyInfo keyInfo = sig.getKeyInfo();
+<a name="139" href="#139">139</a>             <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> samlKeyInfo = 
+<a name="140" href="#140">140</a>                 SAMLUtil.getCredentialDirectlyFromKeyInfo(
+<a name="141" href="#141">141</a>                     keyInfo.getDOM(), data
+<a name="142" href="#142">142</a>                 );
+<a name="143" href="#143">143</a>             
+<a name="144" href="#144">144</a>             <strong class="jxr_keyword">if</strong> (algorithmSuite != <strong class="jxr_keyword">null</strong>) {
+<a name="145" href="#145">145</a>                 <a href="../../../../../org/apache/ws/security/components/crypto/AlgorithmSuiteValidator.html">AlgorithmSuiteValidator</a> algorithmSuiteValidator = <strong class="jxr_keyword">new</strong>
+<a name="146" href="#146">146</a>                     <a href="../../../../../org/apache/ws/security/components/crypto/AlgorithmSuiteValidator.html">AlgorithmSuiteValidator</a>(algorithmSuite);
+<a name="147" href="#147">147</a> 
+<a name="148" href="#148">148</a>                 PublicKey key = <strong class="jxr_keyword">null</strong>;
+<a name="149" href="#149">149</a>                 <strong class="jxr_keyword">if</strong> (samlKeyInfo.getCerts() != <strong class="jxr_keyword">null</strong> &amp;&amp; samlKeyInfo.getCerts()[0] != <strong class="jxr_keyword">null</strong>) {
+<a name="150" href="#150">150</a>                     key = samlKeyInfo.getCerts()[0].getPublicKey();
+<a name="151" href="#151">151</a>                 } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (samlKeyInfo.getPublicKey() != <strong class="jxr_keyword">null</strong>) {
+<a name="152" href="#152">152</a>                     key = samlKeyInfo.getPublicKey();
+<a name="153" href="#153">153</a>                 } <strong class="jxr_keyword">else</strong> {
+<a name="154" href="#154">154</a>                     <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="155" href="#155">155</a>                         WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLsecurity"</span>,
+<a name="156" href="#156">156</a>                         <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"cannot get certificate or key"</span>}
+<a name="157" href="#157">157</a>                     );
+<a name="158" href="#158">158</a>                 }
+<a name="159" href="#159">159</a>             
+<a name="160" href="#160">160</a>                 <em class="jxr_comment">// Not checking signature here, just marshalling into an XMLSignature</em>
+<a name="161" href="#161">161</a>                 <em class="jxr_comment">// structure for testing the transform/digest algorithms etc.</em>
+<a name="162" href="#162">162</a>                 XMLValidateContext context = <strong class="jxr_keyword">new</strong> DOMValidateContext(key, sig.getDOM());
+<a name="163" href="#163">163</a>                 context.setProperty(<span class="jxr_string">"org.apache.jcp.xml.dsig.secureValidation"</span>, Boolean.TRUE);
+<a name="164" href="#164">164</a> 
+<a name="165" href="#165">165</a>                 XMLSignature xmlSignature;
+<a name="166" href="#166">166</a>                 <strong class="jxr_keyword">try</strong> {
+<a name="167" href="#167">167</a>                     xmlSignature = signatureFactory.unmarshalXMLSignature(context);
+<a name="168" href="#168">168</a>                 } <strong class="jxr_keyword">catch</strong> (MarshalException ex) {
+<a name="169" href="#169">169</a>                     <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="170" href="#170">170</a>                         WSSecurityException.FAILED_CHECK, <span class="jxr_string">"invalidSAMLsecurity"</span>, 
+<a name="171" href="#171">171</a>                         <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"cannot get certificate or key"</span>}, ex
+<a name="172" href="#172">172</a>                     );
+<a name="173" href="#173">173</a>                 }
+<a name="174" href="#174">174</a> 
+<a name="175" href="#175">175</a>                 algorithmSuiteValidator.checkSignatureAlgorithms(xmlSignature);
+<a name="176" href="#176">176</a>                 algorithmSuiteValidator.checkAsymmetricKeyLength(key);
+<a name="177" href="#177">177</a>             }
+<a name="178" href="#178">178</a> 
+<a name="179" href="#179">179</a>             assertion.verifySignature(samlKeyInfo);
+<a name="180" href="#180">180</a>         }
+<a name="181" href="#181">181</a>         <em class="jxr_comment">// Parse the HOK subject if it exists</em>
+<a name="182" href="#182">182</a>         assertion.parseHOKSubject(data, docInfo);
+<a name="183" href="#183">183</a>             
+<a name="184" href="#184">184</a>         <em class="jxr_comment">// Now delegate the rest of the verification to the Validator</em>
+<a name="185" href="#185">185</a>         <a href="../../../../../org/apache/ws/security/validate/Credential.html">Credential</a> credential = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/validate/Credential.html">Credential</a>();
+<a name="186" href="#186">186</a>         credential.setAssertion(assertion);
+<a name="187" href="#187">187</a>         <strong class="jxr_keyword">if</strong> (validator != <strong class="jxr_keyword">null</strong>) {
+<a name="188" href="#188">188</a>             <strong class="jxr_keyword">return</strong> validator.validate(credential, data);
+<a name="189" href="#189">189</a>         }
+<a name="190" href="#190">190</a>         <strong class="jxr_keyword">return</strong> credential;
+<a name="191" href="#191">191</a>     }
+<a name="192" href="#192">192</a> 
+<a name="193" href="#193">193</a> }
 </pre>
 <hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
 </html>