You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ws.apache.org by co...@apache.org on 2012/07/31 18:30:30 UTC

svn commit: r1367668 [28/32] - in /webservices/wss4j/site: ./ apidocs/ apidocs/org/apache/ws/security/ apidocs/org/apache/ws/security/action/ apidocs/org/apache/ws/security/action/class-use/ apidocs/org/apache/ws/security/cache/ apidocs/org/apache/ws/s...

Modified: webservices/wss4j/site/xref/org/apache/ws/security/message/token/package-frame.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/message/token/package-frame.html?rev=1367668&r1=1367667&r2=1367668&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/message/token/package-frame.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/message/token/package-frame.html Tue Jul 31 16:30:10 2012
@@ -3,7 +3,7 @@
 <html xml:lang="en" lang="en">
 	<head>
 		<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
-		<title>WSS4J 1.6.6 Reference Package org.apache.ws.security.message.token</title>
+		<title>WSS4J 1.6.7 Reference Package org.apache.ws.security.message.token</title>
 		<link rel="stylesheet" type="text/css" href="../../../../../../stylesheet.css" title="style" />
 	</head>
 	<body>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/message/token/package-summary.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/message/token/package-summary.html?rev=1367668&r1=1367667&r2=1367668&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/message/token/package-summary.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/message/token/package-summary.html Tue Jul 31 16:30:10 2012
@@ -3,7 +3,7 @@
 <html xml:lang="en" lang="en">
 	<head>
 		<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
-		<title>WSS4J 1.6.6 Reference Package org.apache.ws.security.message.token</title>
+		<title>WSS4J 1.6.7 Reference Package org.apache.ws.security.message.token</title>
 		<link rel="stylesheet" type="text/css" href="../../../../../../stylesheet.css" title="style" />
 	</head>
 	<body>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/package-frame.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/package-frame.html?rev=1367668&r1=1367667&r2=1367668&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/package-frame.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/package-frame.html Tue Jul 31 16:30:10 2012
@@ -3,7 +3,7 @@
 <html xml:lang="en" lang="en">
 	<head>
 		<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
-		<title>WSS4J 1.6.6 Reference Package org.apache.ws.security</title>
+		<title>WSS4J 1.6.7 Reference Package org.apache.ws.security</title>
 		<link rel="stylesheet" type="text/css" href="../../../../stylesheet.css" title="style" />
 	</head>
 	<body>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/package-summary.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/package-summary.html?rev=1367668&r1=1367667&r2=1367668&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/package-summary.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/package-summary.html Tue Jul 31 16:30:10 2012
@@ -3,7 +3,7 @@
 <html xml:lang="en" lang="en">
 	<head>
 		<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
-		<title>WSS4J 1.6.6 Reference Package org.apache.ws.security</title>
+		<title>WSS4J 1.6.7 Reference Package org.apache.ws.security</title>
 		<link rel="stylesheet" type="text/css" href="../../../../stylesheet.css" title="style" />
 	</head>
 	<body>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/processor/package-frame.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/processor/package-frame.html?rev=1367668&r1=1367667&r2=1367668&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/processor/package-frame.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/processor/package-frame.html Tue Jul 31 16:30:10 2012
@@ -3,7 +3,7 @@
 <html xml:lang="en" lang="en">
 	<head>
 		<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
-		<title>WSS4J 1.6.6 Reference Package org.apache.ws.security.processor</title>
+		<title>WSS4J 1.6.7 Reference Package org.apache.ws.security.processor</title>
 		<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="style" />
 	</head>
 	<body>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/processor/package-summary.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/processor/package-summary.html?rev=1367668&r1=1367667&r2=1367668&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/processor/package-summary.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/processor/package-summary.html Tue Jul 31 16:30:10 2012
@@ -3,7 +3,7 @@
 <html xml:lang="en" lang="en">
 	<head>
 		<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
-		<title>WSS4J 1.6.6 Reference Package org.apache.ws.security.processor</title>
+		<title>WSS4J 1.6.7 Reference Package org.apache.ws.security.processor</title>
 		<link rel="stylesheet" type="text/css" href="../../../../../stylesheet.css" title="style" />
 	</head>
 	<body>

Modified: webservices/wss4j/site/xref/org/apache/ws/security/saml/SAMLUtil.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/saml/SAMLUtil.html?rev=1367668&r1=1367667&r2=1367668&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/saml/SAMLUtil.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/saml/SAMLUtil.html Tue Jul 31 16:30:10 2012
@@ -41,354 +41,371 @@
 <a name="31" href="#31">31</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.processor.EncryptedKeyProcessor;
 <a name="32" href="#32">32</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.processor.Processor;
 <a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.ext.AssertionWrapper;
-<a name="34" href="#34">34</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.Base64;
-<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.WSSecurityUtil;
-<a name="36" href="#36">36</a>  
-<a name="37" href="#37">37</a>  <strong class="jxr_keyword">import</strong> org.opensaml.saml2.core.SubjectConfirmationData;
-<a name="38" href="#38">38</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
-<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Node;
-<a name="40" href="#40">40</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Text;
-<a name="41" href="#41">41</a>  
-<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.Callback;
-<a name="43" href="#43">43</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.CallbackHandler;
-<a name="44" href="#44">44</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.XMLStructure;
-<a name="45" href="#45">45</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dom.DOMStructure;
-<a name="46" href="#46">46</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.keyinfo.KeyInfoFactory;
-<a name="47" href="#47">47</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.keyinfo.KeyValue;
-<a name="48" href="#48">48</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.keyinfo.X509Data;
-<a name="49" href="#49">49</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.keyinfo.X509IssuerSerial;
-<a name="50" href="#50">50</a>  <strong class="jxr_keyword">import</strong> javax.xml.namespace.QName;
-<a name="51" href="#51">51</a>  
-<a name="52" href="#52">52</a>  <strong class="jxr_keyword">import</strong> java.security.NoSuchProviderException;
-<a name="53" href="#53">53</a>  <strong class="jxr_keyword">import</strong> java.security.PublicKey;
-<a name="54" href="#54">54</a>  <strong class="jxr_keyword">import</strong> java.security.cert.X509Certificate;
-<a name="55" href="#55">55</a>  <strong class="jxr_keyword">import</strong> java.util.List;
-<a name="56" href="#56">56</a>  
-<a name="57" href="#57">57</a>  <em class="jxr_javadoccomment">/**</em>
-<a name="58" href="#58">58</a>  <em class="jxr_javadoccomment"> * Utility methods for SAML stuff</em>
-<a name="59" href="#59">59</a>  <em class="jxr_javadoccomment"> */</em>
-<a name="60" href="#60">60</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">final</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLUtil.html">SAMLUtil</a> {
-<a name="61" href="#61">61</a>      
-<a name="62" href="#62">62</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> QName BINARY_SECRET = 
-<a name="63" href="#63">63</a>          <strong class="jxr_keyword">new</strong> QName(WSConstants.WST_NS, <span class="jxr_string">"BinarySecret"</span>);
-<a name="64" href="#64">64</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> QName BINARY_SECRET_05_12 = 
-<a name="65" href="#65">65</a>          <strong class="jxr_keyword">new</strong> QName(WSConstants.WST_NS_05_12, <span class="jxr_string">"BinarySecret"</span>);
-<a name="66" href="#66">66</a>      
-<a name="67" href="#67">67</a>      <strong class="jxr_keyword">private</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLUtil.html">SAMLUtil</a>() {
-<a name="68" href="#68">68</a>          <em class="jxr_comment">// Complete</em>
-<a name="69" href="#69">69</a>      }
-<a name="70" href="#70">70</a>  
-<a name="71" href="#71">71</a>      <em class="jxr_javadoccomment">/**</em>
-<a name="72" href="#72">72</a>  <em class="jxr_javadoccomment">     * Get an AssertionWrapper object from parsing a SecurityTokenReference that uses</em>
-<a name="73" href="#73">73</a>  <em class="jxr_javadoccomment">     * a KeyIdentifier that points to a SAML Assertion.</em>
-<a name="74" href="#74">74</a>  <em class="jxr_javadoccomment">     * </em>
-<a name="75" href="#75">75</a>  <em class="jxr_javadoccomment">     * @param secRef the SecurityTokenReference to the SAML Assertion</em>
-<a name="76" href="#76">76</a>  <em class="jxr_javadoccomment">     * @param strElement The SecurityTokenReference DOM element</em>
-<a name="77" href="#77">77</a>  <em class="jxr_javadoccomment">     * @param request The RequestData instance used to obtain configuration</em>
-<a name="78" href="#78">78</a>  <em class="jxr_javadoccomment">     * @param wsDocInfo The WSDocInfo object that holds previous results</em>
-<a name="79" href="#79">79</a>  <em class="jxr_javadoccomment">     * @return an AssertionWrapper object</em>
-<a name="80" href="#80">80</a>  <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
-<a name="81" href="#81">81</a>  <em class="jxr_javadoccomment">     */</em>
-<a name="82" href="#82">82</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> getAssertionFromKeyIdentifier(
-<a name="83" href="#83">83</a>          <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef,
-<a name="84" href="#84">84</a>          Element strElement,
-<a name="85" href="#85">85</a>          <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> request,
-<a name="86" href="#86">86</a>          <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo
-<a name="87" href="#87">87</a>      ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="88" href="#88">88</a>          String keyIdentifierValue = secRef.getKeyIdentifierValue();
-<a name="89" href="#89">89</a>          String type = secRef.getKeyIdentifierValueType();
-<a name="90" href="#90">90</a>          <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a> result = wsDocInfo.getResult(keyIdentifierValue);
-<a name="91" href="#91">91</a>  
-<a name="92" href="#92">92</a>          <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion = <strong class="jxr_keyword">null</strong>;
-<a name="93" href="#93">93</a>          Element token = <strong class="jxr_keyword">null</strong>;
-<a name="94" href="#94">94</a>          <strong class="jxr_keyword">if</strong> (result != <strong class="jxr_keyword">null</strong>) {
-<a name="95" href="#95">95</a>              assertion = 
-<a name="96" href="#96">96</a>                  (<a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
-<a name="97" href="#97">97</a>              <strong class="jxr_keyword">return</strong> assertion;
-<a name="98" href="#98">98</a>          } <strong class="jxr_keyword">else</strong> {
-<a name="99" href="#99">99</a>              token = 
-<a name="100" href="#100">100</a>                 secRef.findProcessedTokenElement(
-<a name="101" href="#101">101</a>                     strElement.getOwnerDocument(), wsDocInfo,
-<a name="102" href="#102">102</a>                     request.getCallbackHandler(),
-<a name="103" href="#103">103</a>                     keyIdentifierValue, type
-<a name="104" href="#104">104</a>                 );
-<a name="105" href="#105">105</a>             <strong class="jxr_keyword">if</strong> (token != <strong class="jxr_keyword">null</strong>) {
-<a name="106" href="#106">106</a>                 <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>(token);
-<a name="107" href="#107">107</a>             }
-<a name="108" href="#108">108</a>             token = 
-<a name="109" href="#109">109</a>                 secRef.findUnprocessedTokenElement(
-<a name="110" href="#110">110</a>                     strElement.getOwnerDocument(), wsDocInfo,
-<a name="111" href="#111">111</a>                     request.getCallbackHandler(), keyIdentifierValue, type
-<a name="112" href="#112">112</a>                 );
-<a name="113" href="#113">113</a>             
-<a name="114" href="#114">114</a>             <strong class="jxr_keyword">if</strong> (token == <strong class="jxr_keyword">null</strong>) {
-<a name="115" href="#115">115</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="116" href="#116">116</a>                     WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLsecurity"</span>
-<a name="117" href="#117">117</a>                 );
-<a name="118" href="#118">118</a>             }
-<a name="119" href="#119">119</a>             <a href="../../../../../org/apache/ws/security/processor/Processor.html">Processor</a> proc = request.getWssConfig().getProcessor(WSSecurityEngine.SAML_TOKEN);
-<a name="120" href="#120">120</a>             List&lt;WSSecurityEngineResult&gt; samlResult =
-<a name="121" href="#121">121</a>                 proc.handleToken(token, request, wsDocInfo);
-<a name="122" href="#122">122</a>             <strong class="jxr_keyword">return</strong> 
-<a name="123" href="#123">123</a>                 (<a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>)samlResult.get(0).get(
-<a name="124" href="#124">124</a>                     WSSecurityEngineResult.TAG_SAML_ASSERTION
+<a name="34" href="#34">34</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.str.STRParser;
+<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.str.SignatureSTRParser;
+<a name="36" href="#36">36</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.Base64;
+<a name="37" href="#37">37</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.WSSecurityUtil;
+<a name="38" href="#38">38</a>  
+<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> org.opensaml.saml2.core.SubjectConfirmationData;
+<a name="40" href="#40">40</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
+<a name="41" href="#41">41</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Node;
+<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Text;
+<a name="43" href="#43">43</a>  
+<a name="44" href="#44">44</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.Callback;
+<a name="45" href="#45">45</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.CallbackHandler;
+<a name="46" href="#46">46</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.XMLStructure;
+<a name="47" href="#47">47</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dom.DOMStructure;
+<a name="48" href="#48">48</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.keyinfo.KeyInfoFactory;
+<a name="49" href="#49">49</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.keyinfo.KeyValue;
+<a name="50" href="#50">50</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.keyinfo.X509Data;
+<a name="51" href="#51">51</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.keyinfo.X509IssuerSerial;
+<a name="52" href="#52">52</a>  <strong class="jxr_keyword">import</strong> javax.xml.namespace.QName;
+<a name="53" href="#53">53</a>  
+<a name="54" href="#54">54</a>  <strong class="jxr_keyword">import</strong> java.security.NoSuchProviderException;
+<a name="55" href="#55">55</a>  <strong class="jxr_keyword">import</strong> java.security.PublicKey;
+<a name="56" href="#56">56</a>  <strong class="jxr_keyword">import</strong> java.security.cert.X509Certificate;
+<a name="57" href="#57">57</a>  <strong class="jxr_keyword">import</strong> java.util.HashMap;
+<a name="58" href="#58">58</a>  <strong class="jxr_keyword">import</strong> java.util.List;
+<a name="59" href="#59">59</a>  
+<a name="60" href="#60">60</a>  <em class="jxr_javadoccomment">/**</em>
+<a name="61" href="#61">61</a>  <em class="jxr_javadoccomment"> * Utility methods for SAML stuff</em>
+<a name="62" href="#62">62</a>  <em class="jxr_javadoccomment"> */</em>
+<a name="63" href="#63">63</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">final</strong> <strong class="jxr_keyword">class</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLUtil.html">SAMLUtil</a> {
+<a name="64" href="#64">64</a>      
+<a name="65" href="#65">65</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> QName BINARY_SECRET = 
+<a name="66" href="#66">66</a>          <strong class="jxr_keyword">new</strong> QName(WSConstants.WST_NS, <span class="jxr_string">"BinarySecret"</span>);
+<a name="67" href="#67">67</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> QName BINARY_SECRET_05_12 = 
+<a name="68" href="#68">68</a>          <strong class="jxr_keyword">new</strong> QName(WSConstants.WST_NS_05_12, <span class="jxr_string">"BinarySecret"</span>);
+<a name="69" href="#69">69</a>      
+<a name="70" href="#70">70</a>      <strong class="jxr_keyword">private</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLUtil.html">SAMLUtil</a>() {
+<a name="71" href="#71">71</a>          <em class="jxr_comment">// Complete</em>
+<a name="72" href="#72">72</a>      }
+<a name="73" href="#73">73</a>  
+<a name="74" href="#74">74</a>      <em class="jxr_javadoccomment">/**</em>
+<a name="75" href="#75">75</a>  <em class="jxr_javadoccomment">     * Get an AssertionWrapper object from parsing a SecurityTokenReference that uses</em>
+<a name="76" href="#76">76</a>  <em class="jxr_javadoccomment">     * a KeyIdentifier that points to a SAML Assertion.</em>
+<a name="77" href="#77">77</a>  <em class="jxr_javadoccomment">     * </em>
+<a name="78" href="#78">78</a>  <em class="jxr_javadoccomment">     * @param secRef the SecurityTokenReference to the SAML Assertion</em>
+<a name="79" href="#79">79</a>  <em class="jxr_javadoccomment">     * @param strElement The SecurityTokenReference DOM element</em>
+<a name="80" href="#80">80</a>  <em class="jxr_javadoccomment">     * @param request The RequestData instance used to obtain configuration</em>
+<a name="81" href="#81">81</a>  <em class="jxr_javadoccomment">     * @param wsDocInfo The WSDocInfo object that holds previous results</em>
+<a name="82" href="#82">82</a>  <em class="jxr_javadoccomment">     * @return an AssertionWrapper object</em>
+<a name="83" href="#83">83</a>  <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
+<a name="84" href="#84">84</a>  <em class="jxr_javadoccomment">     */</em>
+<a name="85" href="#85">85</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> getAssertionFromKeyIdentifier(
+<a name="86" href="#86">86</a>          <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secRef,
+<a name="87" href="#87">87</a>          Element strElement,
+<a name="88" href="#88">88</a>          <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> request,
+<a name="89" href="#89">89</a>          <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> wsDocInfo
+<a name="90" href="#90">90</a>      ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="91" href="#91">91</a>          String keyIdentifierValue = secRef.getKeyIdentifierValue();
+<a name="92" href="#92">92</a>          String type = secRef.getKeyIdentifierValueType();
+<a name="93" href="#93">93</a>          <a href="../../../../../org/apache/ws/security/WSSecurityEngineResult.html">WSSecurityEngineResult</a> result = wsDocInfo.getResult(keyIdentifierValue);
+<a name="94" href="#94">94</a>  
+<a name="95" href="#95">95</a>          <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion = <strong class="jxr_keyword">null</strong>;
+<a name="96" href="#96">96</a>          Element token = <strong class="jxr_keyword">null</strong>;
+<a name="97" href="#97">97</a>          <strong class="jxr_keyword">if</strong> (result != <strong class="jxr_keyword">null</strong>) {
+<a name="98" href="#98">98</a>              assertion = 
+<a name="99" href="#99">99</a>                  (<a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>)result.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
+<a name="100" href="#100">100</a>             <strong class="jxr_keyword">return</strong> assertion;
+<a name="101" href="#101">101</a>         } <strong class="jxr_keyword">else</strong> {
+<a name="102" href="#102">102</a>             token = 
+<a name="103" href="#103">103</a>                 secRef.findProcessedTokenElement(
+<a name="104" href="#104">104</a>                     strElement.getOwnerDocument(), wsDocInfo,
+<a name="105" href="#105">105</a>                     request.getCallbackHandler(),
+<a name="106" href="#106">106</a>                     keyIdentifierValue, type
+<a name="107" href="#107">107</a>                 );
+<a name="108" href="#108">108</a>             <strong class="jxr_keyword">if</strong> (token != <strong class="jxr_keyword">null</strong>) {
+<a name="109" href="#109">109</a>                 <strong class="jxr_keyword">if</strong> (!<span class="jxr_string">"Assertion"</span>.equals(token.getLocalName())) {
+<a name="110" href="#110">110</a>                     <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="111" href="#111">111</a>                         WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLsecurity"</span>
+<a name="112" href="#112">112</a>                     );
+<a name="113" href="#113">113</a>                 }
+<a name="114" href="#114">114</a>                 <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>(token);
+<a name="115" href="#115">115</a>             }
+<a name="116" href="#116">116</a>             token = 
+<a name="117" href="#117">117</a>                 secRef.findUnprocessedTokenElement(
+<a name="118" href="#118">118</a>                     strElement.getOwnerDocument(), wsDocInfo,
+<a name="119" href="#119">119</a>                     request.getCallbackHandler(), keyIdentifierValue, type
+<a name="120" href="#120">120</a>                 );
+<a name="121" href="#121">121</a>             
+<a name="122" href="#122">122</a>             <strong class="jxr_keyword">if</strong> (token == <strong class="jxr_keyword">null</strong> || !<span class="jxr_string">"Assertion"</span>.equals(token.getLocalName())) {
+<a name="123" href="#123">123</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="124" href="#124">124</a>                     WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLsecurity"</span>
 <a name="125" href="#125">125</a>                 );
-<a name="126" href="#126">126</a>         }
-<a name="127" href="#127">127</a>     }
-<a name="128" href="#128">128</a>     
-<a name="129" href="#129">129</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="130" href="#130">130</a> <em class="jxr_javadoccomment">     * Parse a SAML Assertion to obtain a SAMLKeyInfo object from</em>
-<a name="131" href="#131">131</a> <em class="jxr_javadoccomment">     * the Subject of the assertion</em>
-<a name="132" href="#132">132</a> <em class="jxr_javadoccomment">     * </em>
-<a name="133" href="#133">133</a> <em class="jxr_javadoccomment">     * @param assertion The SAML Assertion</em>
-<a name="134" href="#134">134</a> <em class="jxr_javadoccomment">     * @param data The RequestData instance used to obtain configuration</em>
-<a name="135" href="#135">135</a> <em class="jxr_javadoccomment">     * @param docInfo A WSDocInfo instance</em>
-<a name="136" href="#136">136</a> <em class="jxr_javadoccomment">     * @param bspCompliant Whether to process tokens in compliance with the BSP spec or not</em>
-<a name="137" href="#137">137</a> <em class="jxr_javadoccomment">     * @return a SAMLKeyInfo object</em>
-<a name="138" href="#138">138</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
-<a name="139" href="#139">139</a> <em class="jxr_javadoccomment">     */</em>
-<a name="140" href="#140">140</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> getCredentialFromSubject(
-<a name="141" href="#141">141</a>         <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion, 
-<a name="142" href="#142">142</a>         <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data,
-<a name="143" href="#143">143</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo,
-<a name="144" href="#144">144</a>         <strong class="jxr_keyword">boolean</strong> bspCompliant
-<a name="145" href="#145">145</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="146" href="#146">146</a>         <strong class="jxr_keyword">if</strong> (assertion.getSaml1() != <strong class="jxr_keyword">null</strong>) {
-<a name="147" href="#147">147</a>             <strong class="jxr_keyword">return</strong> getCredentialFromSubject(assertion.getSaml1(), data, docInfo, bspCompliant);
-<a name="148" href="#148">148</a>         } <strong class="jxr_keyword">else</strong> {
-<a name="149" href="#149">149</a>             <strong class="jxr_keyword">return</strong> getCredentialFromSubject(assertion.getSaml2(), data, docInfo, bspCompliant);
-<a name="150" href="#150">150</a>         }
-<a name="151" href="#151">151</a>     }
-<a name="152" href="#152">152</a>     
-<a name="153" href="#153">153</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="154" href="#154">154</a> <em class="jxr_javadoccomment">     * Try to get the secret key from a CallbackHandler implementation</em>
-<a name="155" href="#155">155</a> <em class="jxr_javadoccomment">     * @param cb a CallbackHandler implementation</em>
-<a name="156" href="#156">156</a> <em class="jxr_javadoccomment">     * @return An array of bytes corresponding to the secret key (can be null)</em>
-<a name="157" href="#157">157</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
-<a name="158" href="#158">158</a> <em class="jxr_javadoccomment">     */</em>
-<a name="159" href="#159">159</a>     <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> byte[] getSecretKeyFromCallbackHandler(
-<a name="160" href="#160">160</a>         String id,
-<a name="161" href="#161">161</a>         CallbackHandler cb
-<a name="162" href="#162">162</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="163" href="#163">163</a>         <strong class="jxr_keyword">if</strong> (cb != <strong class="jxr_keyword">null</strong>) {
-<a name="164" href="#164">164</a>             <a href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a> pwcb = 
-<a name="165" href="#165">165</a>                 <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>(id, WSPasswordCallback.SECRET_KEY);
-<a name="166" href="#166">166</a>             <strong class="jxr_keyword">try</strong> {
-<a name="167" href="#167">167</a>                 cb.handle(<strong class="jxr_keyword">new</strong> Callback[]{pwcb});
-<a name="168" href="#168">168</a>             } <strong class="jxr_keyword">catch</strong> (Exception e1) {
-<a name="169" href="#169">169</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILURE, <span class="jxr_string">"noKey"</span>,
-<a name="170" href="#170">170</a>                         <strong class="jxr_keyword">new</strong> Object[] { id }, e1);
-<a name="171" href="#171">171</a>             }
-<a name="172" href="#172">172</a>             <strong class="jxr_keyword">return</strong> pwcb.getKey();
-<a name="173" href="#173">173</a>         }
-<a name="174" href="#174">174</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="175" href="#175">175</a>     }
-<a name="176" href="#176">176</a>     
-<a name="177" href="#177">177</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="178" href="#178">178</a> <em class="jxr_javadoccomment">     * Get the SAMLKeyInfo object corresponding to the credential stored in the Subject of a </em>
-<a name="179" href="#179">179</a> <em class="jxr_javadoccomment">     * SAML 1.1 assertion</em>
-<a name="180" href="#180">180</a> <em class="jxr_javadoccomment">     * @param assertion The SAML 1.1 assertion</em>
-<a name="181" href="#181">181</a> <em class="jxr_javadoccomment">     * @param data The RequestData instance used to obtain configuration</em>
-<a name="182" href="#182">182</a> <em class="jxr_javadoccomment">     * @param docInfo A WSDocInfo instance</em>
-<a name="183" href="#183">183</a> <em class="jxr_javadoccomment">     * @param bspCompliant Whether to process tokens in compliance with the BSP spec or not</em>
-<a name="184" href="#184">184</a> <em class="jxr_javadoccomment">     * @return The SAMLKeyInfo object obtained from the Subject</em>
-<a name="185" href="#185">185</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
-<a name="186" href="#186">186</a> <em class="jxr_javadoccomment">     */</em>
-<a name="187" href="#187">187</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> getCredentialFromSubject(
-<a name="188" href="#188">188</a>         org.opensaml.saml1.core.Assertion assertion,
-<a name="189" href="#189">189</a>         <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data,
-<a name="190" href="#190">190</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo,
-<a name="191" href="#191">191</a>         <strong class="jxr_keyword">boolean</strong> bspCompliant
-<a name="192" href="#192">192</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="193" href="#193">193</a>         <em class="jxr_comment">// First try to get the credential from a CallbackHandler</em>
-<a name="194" href="#194">194</a>         byte[] key = getSecretKeyFromCallbackHandler(assertion.getID(), data.getCallbackHandler());
-<a name="195" href="#195">195</a>         <strong class="jxr_keyword">if</strong> (key != <strong class="jxr_keyword">null</strong> &amp;&amp; key.length &gt; 0) {
-<a name="196" href="#196">196</a>             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(key);
-<a name="197" href="#197">197</a>         }
-<a name="198" href="#198">198</a>         
-<a name="199" href="#199">199</a>         <strong class="jxr_keyword">for</strong> (org.opensaml.saml1.core.Statement stmt : assertion.getStatements()) {
-<a name="200" href="#200">200</a>             org.opensaml.saml1.core.Subject samlSubject = <strong class="jxr_keyword">null</strong>;
-<a name="201" href="#201">201</a>             <strong class="jxr_keyword">if</strong> (stmt instanceof org.opensaml.saml1.core.AttributeStatement) {
-<a name="202" href="#202">202</a>                 org.opensaml.saml1.core.AttributeStatement attrStmt = 
-<a name="203" href="#203">203</a>                     (org.opensaml.saml1.core.AttributeStatement) stmt;
-<a name="204" href="#204">204</a>                 samlSubject = attrStmt.getSubject();
-<a name="205" href="#205">205</a>             } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (stmt instanceof org.opensaml.saml1.core.AuthenticationStatement) {
-<a name="206" href="#206">206</a>                 org.opensaml.saml1.core.AuthenticationStatement authStmt = 
-<a name="207" href="#207">207</a>                     (org.opensaml.saml1.core.AuthenticationStatement) stmt;
-<a name="208" href="#208">208</a>                 samlSubject = authStmt.getSubject();
-<a name="209" href="#209">209</a>             } <strong class="jxr_keyword">else</strong> {
-<a name="210" href="#210">210</a>                 org.opensaml.saml1.core.AuthorizationDecisionStatement authzStmt =
-<a name="211" href="#211">211</a>                     (org.opensaml.saml1.core.AuthorizationDecisionStatement)stmt;
-<a name="212" href="#212">212</a>                 samlSubject = authzStmt.getSubject();
-<a name="213" href="#213">213</a>             }
-<a name="214" href="#214">214</a>             
-<a name="215" href="#215">215</a>             <strong class="jxr_keyword">if</strong> (samlSubject == <strong class="jxr_keyword">null</strong>) {
-<a name="216" href="#216">216</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="217" href="#217">217</a>                     WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLToken"</span>, 
-<a name="218" href="#218">218</a>                     <strong class="jxr_keyword">new</strong> Object[] {<span class="jxr_string">"for Signature (no Subject)"</span>}
-<a name="219" href="#219">219</a>                 );
-<a name="220" href="#220">220</a>             }
-<a name="221" href="#221">221</a> 
-<a name="222" href="#222">222</a>             Element sub = samlSubject.getSubjectConfirmation().getDOM();
-<a name="223" href="#223">223</a>             Element keyInfoElement = 
-<a name="224" href="#224">224</a>                 WSSecurityUtil.getDirectChildElement(sub, <span class="jxr_string">"KeyInfo"</span>, WSConstants.SIG_NS);
-<a name="225" href="#225">225</a>             <strong class="jxr_keyword">if</strong> (keyInfoElement != <strong class="jxr_keyword">null</strong>) {
-<a name="226" href="#226">226</a>                 <strong class="jxr_keyword">return</strong> getCredentialFromKeyInfo(keyInfoElement, data, docInfo, bspCompliant);
-<a name="227" href="#227">227</a>             }
-<a name="228" href="#228">228</a>         }
+<a name="126" href="#126">126</a>             }
+<a name="127" href="#127">127</a>             <a href="../../../../../org/apache/ws/security/processor/Processor.html">Processor</a> proc = request.getWssConfig().getProcessor(WSSecurityEngine.SAML_TOKEN);
+<a name="128" href="#128">128</a>             List&lt;WSSecurityEngineResult&gt; samlResult =
+<a name="129" href="#129">129</a>                 proc.handleToken(token, request, wsDocInfo);
+<a name="130" href="#130">130</a>             <strong class="jxr_keyword">return</strong> 
+<a name="131" href="#131">131</a>                 (<a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a>)samlResult.get(0).get(
+<a name="132" href="#132">132</a>                     WSSecurityEngineResult.TAG_SAML_ASSERTION
+<a name="133" href="#133">133</a>                 );
+<a name="134" href="#134">134</a>         }
+<a name="135" href="#135">135</a>     }
+<a name="136" href="#136">136</a>     
+<a name="137" href="#137">137</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="138" href="#138">138</a> <em class="jxr_javadoccomment">     * Parse a SAML Assertion to obtain a SAMLKeyInfo object from</em>
+<a name="139" href="#139">139</a> <em class="jxr_javadoccomment">     * the Subject of the assertion</em>
+<a name="140" href="#140">140</a> <em class="jxr_javadoccomment">     * </em>
+<a name="141" href="#141">141</a> <em class="jxr_javadoccomment">     * @param assertion The SAML Assertion</em>
+<a name="142" href="#142">142</a> <em class="jxr_javadoccomment">     * @param data The RequestData instance used to obtain configuration</em>
+<a name="143" href="#143">143</a> <em class="jxr_javadoccomment">     * @param docInfo A WSDocInfo instance</em>
+<a name="144" href="#144">144</a> <em class="jxr_javadoccomment">     * @param bspCompliant Whether to process tokens in compliance with the BSP spec or not</em>
+<a name="145" href="#145">145</a> <em class="jxr_javadoccomment">     * @return a SAMLKeyInfo object</em>
+<a name="146" href="#146">146</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
+<a name="147" href="#147">147</a> <em class="jxr_javadoccomment">     */</em>
+<a name="148" href="#148">148</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> getCredentialFromSubject(
+<a name="149" href="#149">149</a>         <a href="../../../../../org/apache/ws/security/saml/ext/AssertionWrapper.html">AssertionWrapper</a> assertion, 
+<a name="150" href="#150">150</a>         <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data,
+<a name="151" href="#151">151</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo,
+<a name="152" href="#152">152</a>         <strong class="jxr_keyword">boolean</strong> bspCompliant
+<a name="153" href="#153">153</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="154" href="#154">154</a>         <strong class="jxr_keyword">if</strong> (assertion.getSaml1() != <strong class="jxr_keyword">null</strong>) {
+<a name="155" href="#155">155</a>             <strong class="jxr_keyword">return</strong> getCredentialFromSubject(assertion.getSaml1(), data, docInfo, bspCompliant);
+<a name="156" href="#156">156</a>         } <strong class="jxr_keyword">else</strong> {
+<a name="157" href="#157">157</a>             <strong class="jxr_keyword">return</strong> getCredentialFromSubject(assertion.getSaml2(), data, docInfo, bspCompliant);
+<a name="158" href="#158">158</a>         }
+<a name="159" href="#159">159</a>     }
+<a name="160" href="#160">160</a>     
+<a name="161" href="#161">161</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="162" href="#162">162</a> <em class="jxr_javadoccomment">     * Try to get the secret key from a CallbackHandler implementation</em>
+<a name="163" href="#163">163</a> <em class="jxr_javadoccomment">     * @param cb a CallbackHandler implementation</em>
+<a name="164" href="#164">164</a> <em class="jxr_javadoccomment">     * @return An array of bytes corresponding to the secret key (can be null)</em>
+<a name="165" href="#165">165</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
+<a name="166" href="#166">166</a> <em class="jxr_javadoccomment">     */</em>
+<a name="167" href="#167">167</a>     <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> byte[] getSecretKeyFromCallbackHandler(
+<a name="168" href="#168">168</a>         String id,
+<a name="169" href="#169">169</a>         CallbackHandler cb
+<a name="170" href="#170">170</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="171" href="#171">171</a>         <strong class="jxr_keyword">if</strong> (cb != <strong class="jxr_keyword">null</strong>) {
+<a name="172" href="#172">172</a>             <a href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a> pwcb = 
+<a name="173" href="#173">173</a>                 <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSPasswordCallback.html">WSPasswordCallback</a>(id, WSPasswordCallback.SECRET_KEY);
+<a name="174" href="#174">174</a>             <strong class="jxr_keyword">try</strong> {
+<a name="175" href="#175">175</a>                 cb.handle(<strong class="jxr_keyword">new</strong> Callback[]{pwcb});
+<a name="176" href="#176">176</a>             } <strong class="jxr_keyword">catch</strong> (Exception e1) {
+<a name="177" href="#177">177</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILURE, <span class="jxr_string">"noKey"</span>,
+<a name="178" href="#178">178</a>                         <strong class="jxr_keyword">new</strong> Object[] { id }, e1);
+<a name="179" href="#179">179</a>             }
+<a name="180" href="#180">180</a>             <strong class="jxr_keyword">return</strong> pwcb.getKey();
+<a name="181" href="#181">181</a>         }
+<a name="182" href="#182">182</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="183" href="#183">183</a>     }
+<a name="184" href="#184">184</a>     
+<a name="185" href="#185">185</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="186" href="#186">186</a> <em class="jxr_javadoccomment">     * Get the SAMLKeyInfo object corresponding to the credential stored in the Subject of a </em>
+<a name="187" href="#187">187</a> <em class="jxr_javadoccomment">     * SAML 1.1 assertion</em>
+<a name="188" href="#188">188</a> <em class="jxr_javadoccomment">     * @param assertion The SAML 1.1 assertion</em>
+<a name="189" href="#189">189</a> <em class="jxr_javadoccomment">     * @param data The RequestData instance used to obtain configuration</em>
+<a name="190" href="#190">190</a> <em class="jxr_javadoccomment">     * @param docInfo A WSDocInfo instance</em>
+<a name="191" href="#191">191</a> <em class="jxr_javadoccomment">     * @param bspCompliant Whether to process tokens in compliance with the BSP spec or not</em>
+<a name="192" href="#192">192</a> <em class="jxr_javadoccomment">     * @return The SAMLKeyInfo object obtained from the Subject</em>
+<a name="193" href="#193">193</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
+<a name="194" href="#194">194</a> <em class="jxr_javadoccomment">     */</em>
+<a name="195" href="#195">195</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> getCredentialFromSubject(
+<a name="196" href="#196">196</a>         org.opensaml.saml1.core.Assertion assertion,
+<a name="197" href="#197">197</a>         <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data,
+<a name="198" href="#198">198</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo,
+<a name="199" href="#199">199</a>         <strong class="jxr_keyword">boolean</strong> bspCompliant
+<a name="200" href="#200">200</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="201" href="#201">201</a>         <em class="jxr_comment">// First try to get the credential from a CallbackHandler</em>
+<a name="202" href="#202">202</a>         byte[] key = getSecretKeyFromCallbackHandler(assertion.getID(), data.getCallbackHandler());
+<a name="203" href="#203">203</a>         <strong class="jxr_keyword">if</strong> (key != <strong class="jxr_keyword">null</strong> &amp;&amp; key.length &gt; 0) {
+<a name="204" href="#204">204</a>             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(key);
+<a name="205" href="#205">205</a>         }
+<a name="206" href="#206">206</a>         
+<a name="207" href="#207">207</a>         <strong class="jxr_keyword">for</strong> (org.opensaml.saml1.core.Statement stmt : assertion.getStatements()) {
+<a name="208" href="#208">208</a>             org.opensaml.saml1.core.Subject samlSubject = <strong class="jxr_keyword">null</strong>;
+<a name="209" href="#209">209</a>             <strong class="jxr_keyword">if</strong> (stmt instanceof org.opensaml.saml1.core.AttributeStatement) {
+<a name="210" href="#210">210</a>                 org.opensaml.saml1.core.AttributeStatement attrStmt = 
+<a name="211" href="#211">211</a>                     (org.opensaml.saml1.core.AttributeStatement) stmt;
+<a name="212" href="#212">212</a>                 samlSubject = attrStmt.getSubject();
+<a name="213" href="#213">213</a>             } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (stmt instanceof org.opensaml.saml1.core.AuthenticationStatement) {
+<a name="214" href="#214">214</a>                 org.opensaml.saml1.core.AuthenticationStatement authStmt = 
+<a name="215" href="#215">215</a>                     (org.opensaml.saml1.core.AuthenticationStatement) stmt;
+<a name="216" href="#216">216</a>                 samlSubject = authStmt.getSubject();
+<a name="217" href="#217">217</a>             } <strong class="jxr_keyword">else</strong> {
+<a name="218" href="#218">218</a>                 org.opensaml.saml1.core.AuthorizationDecisionStatement authzStmt =
+<a name="219" href="#219">219</a>                     (org.opensaml.saml1.core.AuthorizationDecisionStatement)stmt;
+<a name="220" href="#220">220</a>                 samlSubject = authzStmt.getSubject();
+<a name="221" href="#221">221</a>             }
+<a name="222" href="#222">222</a>             
+<a name="223" href="#223">223</a>             <strong class="jxr_keyword">if</strong> (samlSubject == <strong class="jxr_keyword">null</strong>) {
+<a name="224" href="#224">224</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="225" href="#225">225</a>                     WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLToken"</span>, 
+<a name="226" href="#226">226</a>                     <strong class="jxr_keyword">new</strong> Object[] {<span class="jxr_string">"for Signature (no Subject)"</span>}
+<a name="227" href="#227">227</a>                 );
+<a name="228" href="#228">228</a>             }
 <a name="229" href="#229">229</a> 
-<a name="230" href="#230">230</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="231" href="#231">231</a>     }
-<a name="232" href="#232">232</a>     
-<a name="233" href="#233">233</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="234" href="#234">234</a> <em class="jxr_javadoccomment">     * Get the SAMLKeyInfo object corresponding to the credential stored in the Subject of a </em>
-<a name="235" href="#235">235</a> <em class="jxr_javadoccomment">     * SAML 2 assertion</em>
-<a name="236" href="#236">236</a> <em class="jxr_javadoccomment">     * @param assertion The SAML 2 assertion</em>
-<a name="237" href="#237">237</a> <em class="jxr_javadoccomment">     * @param data The RequestData instance used to obtain configuration</em>
-<a name="238" href="#238">238</a> <em class="jxr_javadoccomment">     * @param docInfo A WSDocInfo instance</em>
-<a name="239" href="#239">239</a> <em class="jxr_javadoccomment">     * @param bspCompliant Whether to process tokens in compliance with the BSP spec or not</em>
-<a name="240" href="#240">240</a> <em class="jxr_javadoccomment">     * @return The SAMLKeyInfo object obtained from the Subject</em>
-<a name="241" href="#241">241</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
-<a name="242" href="#242">242</a> <em class="jxr_javadoccomment">     */</em>
-<a name="243" href="#243">243</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> getCredentialFromSubject(
-<a name="244" href="#244">244</a>         org.opensaml.saml2.core.Assertion assertion,
-<a name="245" href="#245">245</a>         <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data,
-<a name="246" href="#246">246</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo,
-<a name="247" href="#247">247</a>         <strong class="jxr_keyword">boolean</strong> bspCompliant
-<a name="248" href="#248">248</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="249" href="#249">249</a>         <em class="jxr_comment">// First try to get the credential from a CallbackHandler</em>
-<a name="250" href="#250">250</a>         byte[] key = getSecretKeyFromCallbackHandler(assertion.getID(), data.getCallbackHandler());
-<a name="251" href="#251">251</a>         <strong class="jxr_keyword">if</strong> (key != <strong class="jxr_keyword">null</strong> &amp;&amp; key.length &gt; 0) {
-<a name="252" href="#252">252</a>             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(key);
-<a name="253" href="#253">253</a>         }
-<a name="254" href="#254">254</a>         
-<a name="255" href="#255">255</a>         org.opensaml.saml2.core.Subject samlSubject = assertion.getSubject();
-<a name="256" href="#256">256</a>         <strong class="jxr_keyword">if</strong> (samlSubject == <strong class="jxr_keyword">null</strong>) {
-<a name="257" href="#257">257</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="258" href="#258">258</a>                 WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLToken"</span>, 
-<a name="259" href="#259">259</a>                 <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"for Signature (no Subject)"</span>}
-<a name="260" href="#260">260</a>             );
+<a name="230" href="#230">230</a>             Element sub = samlSubject.getSubjectConfirmation().getDOM();
+<a name="231" href="#231">231</a>             Element keyInfoElement = 
+<a name="232" href="#232">232</a>                 WSSecurityUtil.getDirectChildElement(sub, <span class="jxr_string">"KeyInfo"</span>, WSConstants.SIG_NS);
+<a name="233" href="#233">233</a>             <strong class="jxr_keyword">if</strong> (keyInfoElement != <strong class="jxr_keyword">null</strong>) {
+<a name="234" href="#234">234</a>                 <strong class="jxr_keyword">return</strong> getCredentialFromKeyInfo(keyInfoElement, data, docInfo, bspCompliant);
+<a name="235" href="#235">235</a>             }
+<a name="236" href="#236">236</a>         }
+<a name="237" href="#237">237</a> 
+<a name="238" href="#238">238</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="239" href="#239">239</a>     }
+<a name="240" href="#240">240</a>     
+<a name="241" href="#241">241</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="242" href="#242">242</a> <em class="jxr_javadoccomment">     * Get the SAMLKeyInfo object corresponding to the credential stored in the Subject of a </em>
+<a name="243" href="#243">243</a> <em class="jxr_javadoccomment">     * SAML 2 assertion</em>
+<a name="244" href="#244">244</a> <em class="jxr_javadoccomment">     * @param assertion The SAML 2 assertion</em>
+<a name="245" href="#245">245</a> <em class="jxr_javadoccomment">     * @param data The RequestData instance used to obtain configuration</em>
+<a name="246" href="#246">246</a> <em class="jxr_javadoccomment">     * @param docInfo A WSDocInfo instance</em>
+<a name="247" href="#247">247</a> <em class="jxr_javadoccomment">     * @param bspCompliant Whether to process tokens in compliance with the BSP spec or not</em>
+<a name="248" href="#248">248</a> <em class="jxr_javadoccomment">     * @return The SAMLKeyInfo object obtained from the Subject</em>
+<a name="249" href="#249">249</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
+<a name="250" href="#250">250</a> <em class="jxr_javadoccomment">     */</em>
+<a name="251" href="#251">251</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> getCredentialFromSubject(
+<a name="252" href="#252">252</a>         org.opensaml.saml2.core.Assertion assertion,
+<a name="253" href="#253">253</a>         <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data,
+<a name="254" href="#254">254</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo,
+<a name="255" href="#255">255</a>         <strong class="jxr_keyword">boolean</strong> bspCompliant
+<a name="256" href="#256">256</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="257" href="#257">257</a>         <em class="jxr_comment">// First try to get the credential from a CallbackHandler</em>
+<a name="258" href="#258">258</a>         byte[] key = getSecretKeyFromCallbackHandler(assertion.getID(), data.getCallbackHandler());
+<a name="259" href="#259">259</a>         <strong class="jxr_keyword">if</strong> (key != <strong class="jxr_keyword">null</strong> &amp;&amp; key.length &gt; 0) {
+<a name="260" href="#260">260</a>             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(key);
 <a name="261" href="#261">261</a>         }
-<a name="262" href="#262">262</a>         List&lt;org.opensaml.saml2.core.SubjectConfirmation&gt; subjectConfList = 
-<a name="263" href="#263">263</a>             samlSubject.getSubjectConfirmations();
-<a name="264" href="#264">264</a>         <strong class="jxr_keyword">for</strong> (org.opensaml.saml2.core.SubjectConfirmation subjectConfirmation : subjectConfList) {
-<a name="265" href="#265">265</a>             SubjectConfirmationData subjConfData = 
-<a name="266" href="#266">266</a>                 subjectConfirmation.getSubjectConfirmationData();
-<a name="267" href="#267">267</a>             Element sub = subjConfData.getDOM();
-<a name="268" href="#268">268</a>             Element keyInfoElement = 
-<a name="269" href="#269">269</a>                 WSSecurityUtil.getDirectChildElement(sub, <span class="jxr_string">"KeyInfo"</span>, WSConstants.SIG_NS);
-<a name="270" href="#270">270</a>             <strong class="jxr_keyword">if</strong> (keyInfoElement != <strong class="jxr_keyword">null</strong>) {
-<a name="271" href="#271">271</a>                 <strong class="jxr_keyword">return</strong> getCredentialFromKeyInfo(keyInfoElement, data, docInfo, bspCompliant);
-<a name="272" href="#272">272</a>             }
-<a name="273" href="#273">273</a>         }
-<a name="274" href="#274">274</a> 
-<a name="275" href="#275">275</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="276" href="#276">276</a>     }
-<a name="277" href="#277">277</a>     
-<a name="278" href="#278">278</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="279" href="#279">279</a> <em class="jxr_javadoccomment">     * This method returns a SAMLKeyInfo corresponding to the credential found in the</em>
-<a name="280" href="#280">280</a> <em class="jxr_javadoccomment">     * KeyInfo (DOM Element) argument.</em>
-<a name="281" href="#281">281</a> <em class="jxr_javadoccomment">     * @param keyInfoElement The KeyInfo as a DOM Element</em>
-<a name="282" href="#282">282</a> <em class="jxr_javadoccomment">     * @param data The RequestData instance used to obtain configuration</em>
-<a name="283" href="#283">283</a> <em class="jxr_javadoccomment">     * @param docInfo A WSDocInfo instance</em>
-<a name="284" href="#284">284</a> <em class="jxr_javadoccomment">     * @param bspCompliant Whether to process tokens in compliance with the BSP spec or not</em>
-<a name="285" href="#285">285</a> <em class="jxr_javadoccomment">     * @return The credential (as a SAMLKeyInfo object)</em>
-<a name="286" href="#286">286</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
-<a name="287" href="#287">287</a> <em class="jxr_javadoccomment">     */</em>
-<a name="288" href="#288">288</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> getCredentialFromKeyInfo(
-<a name="289" href="#289">289</a>         Element keyInfoElement,
-<a name="290" href="#290">290</a>         <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data,
-<a name="291" href="#291">291</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo,
-<a name="292" href="#292">292</a>         <strong class="jxr_keyword">boolean</strong> bspCompliant
-<a name="293" href="#293">293</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="294" href="#294">294</a>         <em class="jxr_comment">//</em>
-<a name="295" href="#295">295</a>         <em class="jxr_comment">// First try to find an EncryptedKey or a BinarySecret via DOM</em>
-<a name="296" href="#296">296</a>         <em class="jxr_comment">//</em>
-<a name="297" href="#297">297</a>         Node node = keyInfoElement.getFirstChild();
-<a name="298" href="#298">298</a>         <strong class="jxr_keyword">while</strong> (node != <strong class="jxr_keyword">null</strong>) {
-<a name="299" href="#299">299</a>             <strong class="jxr_keyword">if</strong> (Node.ELEMENT_NODE == node.getNodeType()) {
-<a name="300" href="#300">300</a>                 QName el = <strong class="jxr_keyword">new</strong> QName(node.getNamespaceURI(), node.getLocalName());
-<a name="301" href="#301">301</a>                 <strong class="jxr_keyword">if</strong> (el.equals(WSSecurityEngine.ENCRYPTED_KEY)) {
-<a name="302" href="#302">302</a>                     <a href="../../../../../org/apache/ws/security/processor/EncryptedKeyProcessor.html">EncryptedKeyProcessor</a> proc = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/processor/EncryptedKeyProcessor.html">EncryptedKeyProcessor</a>();
-<a name="303" href="#303">303</a>                     List&lt;WSSecurityEngineResult&gt; result =
-<a name="304" href="#304">304</a>                         proc.handleToken((Element)node, data, docInfo);
-<a name="305" href="#305">305</a>                     byte[] secret = 
-<a name="306" href="#306">306</a>                         (byte[])result.get(0).get(
-<a name="307" href="#307">307</a>                             WSSecurityEngineResult.TAG_SECRET
-<a name="308" href="#308">308</a>                         );
-<a name="309" href="#309">309</a>                     <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(secret);
-<a name="310" href="#310">310</a>                 } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (el.equals(BINARY_SECRET) || el.equals(BINARY_SECRET_05_12)) {
-<a name="311" href="#311">311</a>                     Text txt = (Text)node.getFirstChild();
-<a name="312" href="#312">312</a>                     <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(Base64.decode(txt.getData()));
-<a name="313" href="#313">313</a>                 }
-<a name="314" href="#314">314</a>             }
-<a name="315" href="#315">315</a>             node = node.getNextSibling();
-<a name="316" href="#316">316</a>         }
-<a name="317" href="#317">317</a>         
-<a name="318" href="#318">318</a>         <em class="jxr_comment">//</em>
-<a name="319" href="#319">319</a>         <em class="jxr_comment">// Next marshal the KeyInfo DOM element into a javax KeyInfo object and get the</em>
-<a name="320" href="#320">320</a>         <em class="jxr_comment">// (public key) credential</em>
-<a name="321" href="#321">321</a>         <em class="jxr_comment">//</em>
-<a name="322" href="#322">322</a>         X509Certificate[] certs = <strong class="jxr_keyword">null</strong>;
-<a name="323" href="#323">323</a>         KeyInfoFactory keyInfoFactory = <strong class="jxr_keyword">null</strong>;
-<a name="324" href="#324">324</a>         <strong class="jxr_keyword">try</strong> {
-<a name="325" href="#325">325</a>             keyInfoFactory = KeyInfoFactory.getInstance(<span class="jxr_string">"DOM"</span>, <span class="jxr_string">"ApacheXMLDSig"</span>);
-<a name="326" href="#326">326</a>         } <strong class="jxr_keyword">catch</strong> (NoSuchProviderException ex) {
-<a name="327" href="#327">327</a>             keyInfoFactory = KeyInfoFactory.getInstance(<span class="jxr_string">"DOM"</span>);
-<a name="328" href="#328">328</a>         }
-<a name="329" href="#329">329</a>         XMLStructure keyInfoStructure = <strong class="jxr_keyword">new</strong> DOMStructure(keyInfoElement);
-<a name="330" href="#330">330</a> 
-<a name="331" href="#331">331</a>         <strong class="jxr_keyword">try</strong> {
-<a name="332" href="#332">332</a>             javax.xml.crypto.dsig.keyinfo.KeyInfo keyInfo = 
-<a name="333" href="#333">333</a>                 keyInfoFactory.unmarshalKeyInfo(keyInfoStructure);
-<a name="334" href="#334">334</a>             List&lt;?&gt; list = keyInfo.getContent();
-<a name="335" href="#335">335</a> 
-<a name="336" href="#336">336</a>             <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> i = 0; i &lt; list.size(); i++) {
-<a name="337" href="#337">337</a>                 XMLStructure xmlStructure = (XMLStructure) list.get(i);
-<a name="338" href="#338">338</a>                 <strong class="jxr_keyword">if</strong> (xmlStructure instanceof KeyValue) {
-<a name="339" href="#339">339</a>                     PublicKey publicKey = ((KeyValue)xmlStructure).getPublicKey();
-<a name="340" href="#340">340</a>                     <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(publicKey);
-<a name="341" href="#341">341</a>                 } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (xmlStructure instanceof X509Data) {
-<a name="342" href="#342">342</a>                     List&lt;?&gt; x509Data = ((X509Data)xmlStructure).getContent();
-<a name="343" href="#343">343</a>                     <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> j = 0; j &lt; x509Data.size(); j++) {
-<a name="344" href="#344">344</a>                         Object x509obj = x509Data.get(j);
-<a name="345" href="#345">345</a>                         <strong class="jxr_keyword">if</strong> (x509obj instanceof X509Certificate) {
-<a name="346" href="#346">346</a>                             certs = <strong class="jxr_keyword">new</strong> X509Certificate[1];
-<a name="347" href="#347">347</a>                             certs[0] = (X509Certificate)x509obj;
-<a name="348" href="#348">348</a>                             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(certs);
-<a name="349" href="#349">349</a>                         } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (x509obj instanceof X509IssuerSerial) {
-<a name="350" href="#350">350</a>                             <strong class="jxr_keyword">if</strong> (data.getSigCrypto() == <strong class="jxr_keyword">null</strong>) {
-<a name="351" href="#351">351</a>                                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="352" href="#352">352</a>                                     WSSecurityException.FAILURE, <span class="jxr_string">"noSigCryptoFile"</span>
-<a name="353" href="#353">353</a>                                 );
-<a name="354" href="#354">354</a>                             }
-<a name="355" href="#355">355</a>                             <a href="../../../../../org/apache/ws/security/components/crypto/CryptoType.html">CryptoType</a> cryptoType = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/components/crypto/CryptoType.html">CryptoType</a>(CryptoType.TYPE.ISSUER_SERIAL);
-<a name="356" href="#356">356</a>                             cryptoType.setIssuerSerial(
-<a name="357" href="#357">357</a>                                 ((X509IssuerSerial)x509obj).getIssuerName(), 
-<a name="358" href="#358">358</a>                                 ((X509IssuerSerial)x509obj).getSerialNumber()
-<a name="359" href="#359">359</a>                             );
-<a name="360" href="#360">360</a>                             certs = data.getSigCrypto().getX509Certificates(cryptoType);
-<a name="361" href="#361">361</a>                             <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length &lt; 1) {
-<a name="362" href="#362">362</a>                                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="363" href="#363">363</a>                                     WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLsecurity"</span>,
-<a name="364" href="#364">364</a>                                     <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"cannot get certificate or key"</span>}
-<a name="365" href="#365">365</a>                                 );
-<a name="366" href="#366">366</a>                             }
-<a name="367" href="#367">367</a>                             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(certs);
-<a name="368" href="#368">368</a>                         }
-<a name="369" href="#369">369</a>                     }
-<a name="370" href="#370">370</a>                 }
-<a name="371" href="#371">371</a>             }
-<a name="372" href="#372">372</a>         } <strong class="jxr_keyword">catch</strong> (Exception ex) {
-<a name="373" href="#373">373</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="374" href="#374">374</a>                 WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLsecurity"</span>,
-<a name="375" href="#375">375</a>                 <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"cannot get certificate or key"</span>}, ex
-<a name="376" href="#376">376</a>             );
-<a name="377" href="#377">377</a>         }
-<a name="378" href="#378">378</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="379" href="#379">379</a>     }
-<a name="380" href="#380">380</a> 
-<a name="381" href="#381">381</a> }
+<a name="262" href="#262">262</a>         
+<a name="263" href="#263">263</a>         org.opensaml.saml2.core.Subject samlSubject = assertion.getSubject();
+<a name="264" href="#264">264</a>         <strong class="jxr_keyword">if</strong> (samlSubject == <strong class="jxr_keyword">null</strong>) {
+<a name="265" href="#265">265</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="266" href="#266">266</a>                 WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLToken"</span>, 
+<a name="267" href="#267">267</a>                 <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"for Signature (no Subject)"</span>}
+<a name="268" href="#268">268</a>             );
+<a name="269" href="#269">269</a>         }
+<a name="270" href="#270">270</a>         List&lt;org.opensaml.saml2.core.SubjectConfirmation&gt; subjectConfList = 
+<a name="271" href="#271">271</a>             samlSubject.getSubjectConfirmations();
+<a name="272" href="#272">272</a>         <strong class="jxr_keyword">for</strong> (org.opensaml.saml2.core.SubjectConfirmation subjectConfirmation : subjectConfList) {
+<a name="273" href="#273">273</a>             SubjectConfirmationData subjConfData = 
+<a name="274" href="#274">274</a>                 subjectConfirmation.getSubjectConfirmationData();
+<a name="275" href="#275">275</a>             Element sub = subjConfData.getDOM();
+<a name="276" href="#276">276</a>             Element keyInfoElement = 
+<a name="277" href="#277">277</a>                 WSSecurityUtil.getDirectChildElement(sub, <span class="jxr_string">"KeyInfo"</span>, WSConstants.SIG_NS);
+<a name="278" href="#278">278</a>             <strong class="jxr_keyword">if</strong> (keyInfoElement != <strong class="jxr_keyword">null</strong>) {
+<a name="279" href="#279">279</a>                 <strong class="jxr_keyword">return</strong> getCredentialFromKeyInfo(keyInfoElement, data, docInfo, bspCompliant);
+<a name="280" href="#280">280</a>             }
+<a name="281" href="#281">281</a>         }
+<a name="282" href="#282">282</a> 
+<a name="283" href="#283">283</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="284" href="#284">284</a>     }
+<a name="285" href="#285">285</a>     
+<a name="286" href="#286">286</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="287" href="#287">287</a> <em class="jxr_javadoccomment">     * This method returns a SAMLKeyInfo corresponding to the credential found in the</em>
+<a name="288" href="#288">288</a> <em class="jxr_javadoccomment">     * KeyInfo (DOM Element) argument.</em>
+<a name="289" href="#289">289</a> <em class="jxr_javadoccomment">     * @param keyInfoElement The KeyInfo as a DOM Element</em>
+<a name="290" href="#290">290</a> <em class="jxr_javadoccomment">     * @param data The RequestData instance used to obtain configuration</em>
+<a name="291" href="#291">291</a> <em class="jxr_javadoccomment">     * @param docInfo A WSDocInfo instance</em>
+<a name="292" href="#292">292</a> <em class="jxr_javadoccomment">     * @param bspCompliant Whether to process tokens in compliance with the BSP spec or not</em>
+<a name="293" href="#293">293</a> <em class="jxr_javadoccomment">     * @return The credential (as a SAMLKeyInfo object)</em>
+<a name="294" href="#294">294</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
+<a name="295" href="#295">295</a> <em class="jxr_javadoccomment">     */</em>
+<a name="296" href="#296">296</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> getCredentialFromKeyInfo(
+<a name="297" href="#297">297</a>         Element keyInfoElement,
+<a name="298" href="#298">298</a>         <a href="../../../../../org/apache/ws/security/handler/RequestData.html">RequestData</a> data,
+<a name="299" href="#299">299</a>         <a href="../../../../../org/apache/ws/security/WSDocInfo.html">WSDocInfo</a> docInfo,
+<a name="300" href="#300">300</a>         <strong class="jxr_keyword">boolean</strong> bspCompliant
+<a name="301" href="#301">301</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="302" href="#302">302</a>         <em class="jxr_comment">//</em>
+<a name="303" href="#303">303</a>         <em class="jxr_comment">// First try to find an EncryptedKey, BinarySecret or a SecurityTokenReference via DOM</em>
+<a name="304" href="#304">304</a>         <em class="jxr_comment">//</em>
+<a name="305" href="#305">305</a>         Node node = keyInfoElement.getFirstChild();
+<a name="306" href="#306">306</a>         <strong class="jxr_keyword">while</strong> (node != <strong class="jxr_keyword">null</strong>) {
+<a name="307" href="#307">307</a>             <strong class="jxr_keyword">if</strong> (Node.ELEMENT_NODE == node.getNodeType()) {
+<a name="308" href="#308">308</a>                 QName el = <strong class="jxr_keyword">new</strong> QName(node.getNamespaceURI(), node.getLocalName());
+<a name="309" href="#309">309</a>                 <strong class="jxr_keyword">if</strong> (el.equals(WSSecurityEngine.ENCRYPTED_KEY)) {
+<a name="310" href="#310">310</a>                     <a href="../../../../../org/apache/ws/security/processor/EncryptedKeyProcessor.html">EncryptedKeyProcessor</a> proc = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/processor/EncryptedKeyProcessor.html">EncryptedKeyProcessor</a>();
+<a name="311" href="#311">311</a>                     List&lt;WSSecurityEngineResult&gt; result =
+<a name="312" href="#312">312</a>                         proc.handleToken((Element)node, data, docInfo);
+<a name="313" href="#313">313</a>                     byte[] secret = 
+<a name="314" href="#314">314</a>                         (byte[])result.get(0).get(
+<a name="315" href="#315">315</a>                             WSSecurityEngineResult.TAG_SECRET
+<a name="316" href="#316">316</a>                         );
+<a name="317" href="#317">317</a>                     <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(secret);
+<a name="318" href="#318">318</a>                 } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (el.equals(BINARY_SECRET) || el.equals(BINARY_SECRET_05_12)) {
+<a name="319" href="#319">319</a>                     Text txt = (Text)node.getFirstChild();
+<a name="320" href="#320">320</a>                     <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(Base64.decode(txt.getData()));
+<a name="321" href="#321">321</a>                 } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (SecurityTokenReference.STR_QNAME.equals(el)) {
+<a name="322" href="#322">322</a>                     <a href="../../../../../org/apache/ws/security/str/STRParser.html">STRParser</a> strParser = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/str/SignatureSTRParser.html">SignatureSTRParser</a>();
+<a name="323" href="#323">323</a>                     strParser.parseSecurityTokenReference(
+<a name="324" href="#324">324</a>                         (Element)node, data, docInfo, <strong class="jxr_keyword">new</strong> HashMap&lt;String, Object&gt;()
+<a name="325" href="#325">325</a>                     );
+<a name="326" href="#326">326</a>                     <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a> samlKeyInfo = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(strParser.getCertificates());
+<a name="327" href="#327">327</a>                     samlKeyInfo.setPublicKey(strParser.getPublicKey());
+<a name="328" href="#328">328</a>                     samlKeyInfo.setSecret(strParser.getSecretKey());
+<a name="329" href="#329">329</a>                     <strong class="jxr_keyword">return</strong> samlKeyInfo;
+<a name="330" href="#330">330</a>                 }
+<a name="331" href="#331">331</a>             }
+<a name="332" href="#332">332</a>             node = node.getNextSibling();
+<a name="333" href="#333">333</a>         }
+<a name="334" href="#334">334</a>         
+<a name="335" href="#335">335</a>         <em class="jxr_comment">//</em>
+<a name="336" href="#336">336</a>         <em class="jxr_comment">// Next marshal the KeyInfo DOM element into a javax KeyInfo object and get the</em>
+<a name="337" href="#337">337</a>         <em class="jxr_comment">// (public key) credential</em>
+<a name="338" href="#338">338</a>         <em class="jxr_comment">//</em>
+<a name="339" href="#339">339</a>         X509Certificate[] certs = <strong class="jxr_keyword">null</strong>;
+<a name="340" href="#340">340</a>         KeyInfoFactory keyInfoFactory = <strong class="jxr_keyword">null</strong>;
+<a name="341" href="#341">341</a>         <strong class="jxr_keyword">try</strong> {
+<a name="342" href="#342">342</a>             keyInfoFactory = KeyInfoFactory.getInstance(<span class="jxr_string">"DOM"</span>, <span class="jxr_string">"ApacheXMLDSig"</span>);
+<a name="343" href="#343">343</a>         } <strong class="jxr_keyword">catch</strong> (NoSuchProviderException ex) {
+<a name="344" href="#344">344</a>             keyInfoFactory = KeyInfoFactory.getInstance(<span class="jxr_string">"DOM"</span>);
+<a name="345" href="#345">345</a>         }
+<a name="346" href="#346">346</a>         XMLStructure keyInfoStructure = <strong class="jxr_keyword">new</strong> DOMStructure(keyInfoElement);
+<a name="347" href="#347">347</a> 
+<a name="348" href="#348">348</a>         <strong class="jxr_keyword">try</strong> {
+<a name="349" href="#349">349</a>             javax.xml.crypto.dsig.keyinfo.KeyInfo keyInfo = 
+<a name="350" href="#350">350</a>                 keyInfoFactory.unmarshalKeyInfo(keyInfoStructure);
+<a name="351" href="#351">351</a>             List&lt;?&gt; list = keyInfo.getContent();
+<a name="352" href="#352">352</a> 
+<a name="353" href="#353">353</a>             <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> i = 0; i &lt; list.size(); i++) {
+<a name="354" href="#354">354</a>                 XMLStructure xmlStructure = (XMLStructure) list.get(i);
+<a name="355" href="#355">355</a>                 <strong class="jxr_keyword">if</strong> (xmlStructure instanceof KeyValue) {
+<a name="356" href="#356">356</a>                     PublicKey publicKey = ((KeyValue)xmlStructure).getPublicKey();
+<a name="357" href="#357">357</a>                     <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(publicKey);
+<a name="358" href="#358">358</a>                 } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (xmlStructure instanceof X509Data) {
+<a name="359" href="#359">359</a>                     List&lt;?&gt; x509Data = ((X509Data)xmlStructure).getContent();
+<a name="360" href="#360">360</a>                     <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> j = 0; j &lt; x509Data.size(); j++) {
+<a name="361" href="#361">361</a>                         Object x509obj = x509Data.get(j);
+<a name="362" href="#362">362</a>                         <strong class="jxr_keyword">if</strong> (x509obj instanceof X509Certificate) {
+<a name="363" href="#363">363</a>                             certs = <strong class="jxr_keyword">new</strong> X509Certificate[1];
+<a name="364" href="#364">364</a>                             certs[0] = (X509Certificate)x509obj;
+<a name="365" href="#365">365</a>                             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(certs);
+<a name="366" href="#366">366</a>                         } <strong class="jxr_keyword">else</strong> <strong class="jxr_keyword">if</strong> (x509obj instanceof X509IssuerSerial) {
+<a name="367" href="#367">367</a>                             <strong class="jxr_keyword">if</strong> (data.getSigCrypto() == <strong class="jxr_keyword">null</strong>) {
+<a name="368" href="#368">368</a>                                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="369" href="#369">369</a>                                     WSSecurityException.FAILURE, <span class="jxr_string">"noSigCryptoFile"</span>
+<a name="370" href="#370">370</a>                                 );
+<a name="371" href="#371">371</a>                             }
+<a name="372" href="#372">372</a>                             <a href="../../../../../org/apache/ws/security/components/crypto/CryptoType.html">CryptoType</a> cryptoType = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/components/crypto/CryptoType.html">CryptoType</a>(CryptoType.TYPE.ISSUER_SERIAL);
+<a name="373" href="#373">373</a>                             cryptoType.setIssuerSerial(
+<a name="374" href="#374">374</a>                                 ((X509IssuerSerial)x509obj).getIssuerName(), 
+<a name="375" href="#375">375</a>                                 ((X509IssuerSerial)x509obj).getSerialNumber()
+<a name="376" href="#376">376</a>                             );
+<a name="377" href="#377">377</a>                             certs = data.getSigCrypto().getX509Certificates(cryptoType);
+<a name="378" href="#378">378</a>                             <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length &lt; 1) {
+<a name="379" href="#379">379</a>                                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="380" href="#380">380</a>                                     WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLsecurity"</span>,
+<a name="381" href="#381">381</a>                                     <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"cannot get certificate or key"</span>}
+<a name="382" href="#382">382</a>                                 );
+<a name="383" href="#383">383</a>                             }
+<a name="384" href="#384">384</a>                             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/saml/SAMLKeyInfo.html">SAMLKeyInfo</a>(certs);
+<a name="385" href="#385">385</a>                         }
+<a name="386" href="#386">386</a>                     }
+<a name="387" href="#387">387</a>                 }
+<a name="388" href="#388">388</a>             }
+<a name="389" href="#389">389</a>         } <strong class="jxr_keyword">catch</strong> (Exception ex) {
+<a name="390" href="#390">390</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="391" href="#391">391</a>                 WSSecurityException.FAILURE, <span class="jxr_string">"invalidSAMLsecurity"</span>,
+<a name="392" href="#392">392</a>                 <strong class="jxr_keyword">new</strong> Object[]{<span class="jxr_string">"cannot get certificate or key"</span>}, ex
+<a name="393" href="#393">393</a>             );
+<a name="394" href="#394">394</a>         }
+<a name="395" href="#395">395</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="396" href="#396">396</a>     }
+<a name="397" href="#397">397</a> 
+<a name="398" href="#398">398</a> }
 </pre>
 <hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
 </html>