result = 31 * result + Integer.valueOf(getIteration()).hashCode();
result = 31 * result + Integer.valueOf(getIteration()).hashCode();
/** * This method gets a derived key as defined in WSS Username Token Profile. * * @return Returns the derived key as a byte array * @throws WSSecurityException */ public byte[] getDerivedKey() throws WSSecurityException { if (rawPassword == null || !bspCompliantDerivedKey) { LOG.debug("The raw password was null or the Username Token is not BSP compliant"); throw new WSSecurityException(WSSecurityException.FAILED_AUTHENTICATION); } int iteration = getIteration(); byte[] salt = getSalt(); if (passwordsAreEncoded) { return generateDerivedKey(Base64.decode(rawPassword), salt, iteration); } else { return generateDerivedKey(rawPassword, salt, iteration); } }
/** * This method gets a derived key as defined in WSS Username Token Profile. * * @return Returns the derived key as a byte array * @throws WSSecurityException */ public byte[] getDerivedKey() throws WSSecurityException { if (rawPassword == null || !bspCompliantDerivedKey) { LOG.debug("The raw password was null or the Username Token is not BSP compliant"); throw new WSSecurityException(WSSecurityException.FAILED_AUTHENTICATION); } int iteration = getIteration(); byte[] salt = getSalt(); if (passwordsAreEncoded) { return generateDerivedKey(Base64.decode(rawPassword), salt, iteration); } else { return generateDerivedKey(rawPassword, salt, iteration); } }
int iteration = usernameToken.getIteration(); if (iteration != getIteration()) { return false;
int iteration = usernameToken.getIteration(); if (iteration != getIteration()) { return false;