result = 31 * result + username.hashCode(); String password = getPassword(); if (password != null) { result = 31 * result + password.hashCode();
String password = usernameToken.getPassword(); String nonce = usernameToken.getNonce(); String createdTime = usernameToken.getCreated();
/** * Create a WSUsernameTokenPrincipal from this UsernameToken object */ public Principal createPrincipal() { WSUsernameTokenPrincipal principal = new WSUsernameTokenPrincipal(getName(), isHashed()); principal.setNonce(getNonce()); principal.setPassword(getPassword()); principal.setCreatedTime(getCreated()); return principal; }
@Override protected void verifyPlaintextPassword(UsernameToken usernameToken, RequestData data) throws WSSecurityException { String user = usernameToken.getName(); String password = usernameToken.getPassword(); String pwType = usernameToken.getPasswordType(); // Provide the password to the user for validation WSPasswordCallback pwCb = new WSPasswordCallback(user, password, pwType, WSPasswordCallback.USERNAME_TOKEN, data); try { data.getCallbackHandler().handle(new Callback[] { pwCb }); } catch (IOException e) { if (mlog.isDebugEnabled()) { mlog.debug(e); } throw new WSSecurityException( WSSecurityException.FAILED_AUTHENTICATION); } catch (UnsupportedCallbackException e) { if (mlog.isDebugEnabled()) { mlog.debug(e); } throw new WSSecurityException( WSSecurityException.FAILED_AUTHENTICATION); } } }
String password = usernameToken.getPassword(); String nonce = usernameToken.getNonce(); String createdTime = usernameToken.getCreated();
/** * Create a WSUsernameTokenPrincipal from this UsernameToken object */ public Principal createPrincipal() { WSUsernameTokenPrincipal principal = new WSUsernameTokenPrincipal(getName(), isHashed()); principal.setNonce(getNonce()); principal.setPassword(getPassword()); principal.setCreatedTime(getCreated()); return principal; }
result = 31 * result + username.hashCode(); String password = getPassword(); if (password != null) { result = 31 * result + password.hashCode();
new MuleCredentials(credential.getUsernametoken().getName(), credential.getUsernametoken().getPassword().toCharArray()));
WSPasswordCallback pwCb = new WSPasswordCallback( getName(), getPassword(), getPasswordType(), WSPasswordCallback.USERNAME_TOKEN, data );
WSPasswordCallback pwCb = new WSPasswordCallback( getName(), getPassword(), getPasswordType(), WSPasswordCallback.USERNAME_TOKEN, data );
password = usernameToken.getPassword();
password = usernameToken.getPassword();
return false; if (!compare(usernameToken.getPassword(), getPassword())) { return false;
return false; if (!compare(usernameToken.getPassword(), getPassword())) { return false;
String password = usernameToken.getPassword(); if (usernameToken.isHashed()) { verifyDigestPassword(usernameToken, data);
String password = usernameToken.getPassword(); if (usernameToken.isHashed()) { verifyDigestPassword(usernameToken, data);
(org.apache.ws.security.message.token.UsernameToken) utResult.get(WSSecurityEngineResult.TAG_USERNAME_TOKEN); if(ut.isNoPassword() && wssUt.getPassword() != null) { throw new RampartException("invalidUsernameTokenType"); } else if (!ut.isHashPassword() && (wssUt.getPassword() == null || !wssUt.getPasswordType().equals(WSConstants.PASSWORD_TEXT))) { throw new RampartException("invalidUsernameTokenType");
if (token.getPassword() == null) { action = WSConstants.UT_NOPASSWORD; if (token.isDerivedKey()) { new WSUsernameTokenPrincipal(token.getName(), token.isHashed()); principal.setNonce(token.getNonce()); principal.setPassword(token.getPassword()); principal.setCreatedTime(token.getCreated()); principal.setPasswordType(token.getPasswordType());
if (token.getPassword() == null) { action = WSConstants.UT_NOPASSWORD; if (token.isDerivedKey()) { new WSUsernameTokenPrincipal(token.getName(), token.isHashed()); principal.setNonce(token.getNonce()); principal.setPassword(token.getPassword()); principal.setCreatedTime(token.getCreated()); principal.setPasswordType(token.getPasswordType());