id = getIdAllocator().createId("id-", bodyElement); String prefix = XMLUtils.setNamespace(bodyElement, newAttrNs, newAttrPrefix); bodyElement.setAttributeNS(newAttrNs, prefix + ":Id", id);
new Object[] {user, "signature"}); certUri = getIdAllocator().createSecureId("X509-", certs[0]);
dktId = getIdAllocator().createId("DK-", dkt); String strUri = getIdAllocator().createSecureId("STR-", secRef); secRef.setID(strUri);
String keyInfoUri = getIdAllocator().createSecureId("KI-", null); KeyInfo keyInfo = keyInfoFactory.newKeyInfo( final String attachmentId = getIdAllocator().createId("", getDocument()); WSSecurityUtil.storeBytesInAttachment(xencCipherValue, getDocument(), attachmentId, encryptedEphemeralKey, attachmentCallbackHandler);
String wsuPrefix = XMLUtils.setNamespace(elem, WSConstants.WSU_NS, WSConstants.WSU_PREFIX); String headerId = idAllocator.createId("EH-", elementToEncrypt); elem.setAttributeNS( WSConstants.WSU_NS, wsuPrefix + ":Id", headerId
) { SecurityTokenReference secRefSaml = new SecurityTokenReference(doc); String secRefID = wssConfig.getIdAllocator().createSecureId("STR-", secRefSaml); secRefSaml.setID(secRefID);
String xencEncryptedDataId = idAllocator.createId("ED-", elementToEncrypt); try { if ("Header".equals(modifier)) {
if (StringUtils.isEmpty(id)) { LOG.fine("No ID extracted from token, so just making one up"); id = WSSConfig.getNewInstance().getIdAllocator().createSecureId("_", null);
/** * Creates a SignatureConfimation element. * * The method prepares and initializes a WSSec SignatureConfirmation structure after * the relevant information was set. Before calling <code>prepare()</code> the * filed <code>signatureValue</code> must be set */ public void prepare() { sc = new SignatureConfirmation(getDocument(), signatureValue); sc.setID(getIdAllocator().createId("SC-", sc)); }
if (StringUtils.isEmpty(id)) { LOG.fine("No ID extracted from token, so just making one up"); id = WSSConfig.getNewInstance().getIdAllocator().createSecureId("_", null);
/** * Creates a Timestamp element. * * The method prepares and initializes a WSSec Timestamp structure after the * relevant information was set. Before calling <code>prepare()</code> the * parameter such as <code>timeToLive</code> can be set if the default * value is not suitable. */ public void prepare() { ts = new Timestamp(precisionInMilliSeconds, getDocument(), wsTimeSource, timeToLive); String tsId = getIdAllocator().createId("TS-", ts); ts.setID(tsId); }
) { SecurityTokenReference secRefSaml = new SecurityTokenReference(doc); String secRefID = wssConfig.getIdAllocator().createSecureId("STR-", secRefSaml); secRefSaml.setID(secRefID);
keyInfoUri = getIdAllocator().createSecureId("KI-", keyInfo); strUri = getIdAllocator().createSecureId("STR-", secRef); secRef.setID(strUri);
String encEncryptedDataId = idAllocator.createId("ED-", attachmentId); encDataRef.add("#" + encEncryptedDataId);
tokenIdToRenew, instance); sct.setID(WSSConfig.getNewInstance().getIdAllocator() .createSecureId("sctId-", sct.getElement())); } else { sct = new SecurityContextToken( NegotiationUtils.getWSCVersion(tokenType), writer.getDocument()); sct.setID(WSSConfig.getNewInstance().getIdAllocator() .createSecureId("sctId-", sct.getElement()));
} else { id = wssConfig.getIdAllocator().createId("_", elem); String pfx = null; try {
tokenIdToRenew, instance); sct.setID(WSSConfig.getNewInstance().getIdAllocator() .createSecureId("sctId-", sct.getElement())); } else { sct = new SecurityContextToken( NegotiationUtils.getWSCVersion(tokenType), writer.getDocument()); sct.setID(WSSConfig.getNewInstance().getIdAllocator() .createSecureId("sctId-", sct.getElement()));
} else { id = wssConfig.getIdAllocator().createId("_", elem); String pfx = null; try {
delegatedCredential); bst.addWSUNamespace(); bst.setID(wssConfig.getIdAllocator().createSecureId("BST-", bst));