protected void checkActions( SoapMessage msg, RequestData reqData, List<WSSecurityEngineResult> wsResult, List<Integer> actions, Element body ) throws WSSecurityException { if (ignoreActions) { // Not applicable for the WS-SecurityPolicy case return; } // now check the security actions: do they match, in any order? if (!checkReceiverResultsAnyOrder(wsResult, actions)) { LOG.warning("Security processing failed (actions mismatch)"); throw new WSSecurityException(WSSecurityException.ErrorCode.INVALID_SECURITY); } // Now check to see if SIGNATURE_PARTS are specified String signatureParts = (String)getProperty(msg, ConfigurationConstants.SIGNATURE_PARTS); if (signatureParts != null) { String warning = "To enforce that particular elements were signed you must either " + "use WS-SecurityPolicy, or else use the CryptoCoverageChecker or " + "DefaultCryptoCoverageChecker"; LOG.warning(warning); } }
protected void checkActions( SoapMessage msg, RequestData reqData, List<WSSecurityEngineResult> wsResult, List<Integer> actions, Element body ) throws WSSecurityException { if (ignoreActions) { // Not applicable for the WS-SecurityPolicy case return; } // now check the security actions: do they match, in any order? if (!checkReceiverResultsAnyOrder(wsResult, actions)) { LOG.warning("Security processing failed (actions mismatch)"); throw new WSSecurityException(WSSecurityException.ErrorCode.INVALID_SECURITY); } // Now check to see if SIGNATURE_PARTS are specified String signatureParts = (String)getProperty(msg, ConfigurationConstants.SIGNATURE_PARTS); if (signatureParts != null) { String warning = "To enforce that particular elements were signed you must either " + "use WS-SecurityPolicy, or else use the CryptoCoverageChecker or " + "DefaultCryptoCoverageChecker"; LOG.warning(warning); } }