@Override public int hashCode() { int result = 17; String uri = getURI(); if (uri != null) { result = 31 * result + uri.hashCode(); } String valueType = getValueType(); if (valueType != null) { result = 31 * result + valueType.hashCode(); } return result; }
@Override public boolean equals(Object object) { if (!(object instanceof Reference)) { return false; } Reference reference = (Reference)object; if (!compare(getURI(), reference.getURI())) { return false; } if (!compare(getValueType(), reference.getValueType())) { return false; } return true; }
if (secRef.containsReference()) { String valueType = secRef.getReference().getValueType(); if (token instanceof X509Security && !X509Security.X509_V3_TYPE.equals(valueType) || token instanceof PKIPathSecurity && !PKIPathSecurity.PKI_TYPE.equals(valueType)
/** * Check that the Username token referenced by the SecurityTokenReference argument * is BSP compliant. * @param secRef The SecurityTokenReference to the Username token * @param bspEnforcer a BSPEnforcer instance to enforce BSP rules * @throws WSSecurityException */ public static void checkUsernameTokenBSPCompliance( SecurityTokenReference secRef, BSPEnforcer bspEnforcer ) throws WSSecurityException { if (!secRef.containsReference()) { // BSP does not permit using a KeyIdentifier to refer to a U/T bspEnforcer.handleBSPRule(BSPRule.R4215); } if (secRef.getReference() != null) { String valueType = secRef.getReference().getValueType(); if (!WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE.equals(valueType)) { bspEnforcer.handleBSPRule(BSPRule.R4214); } } }
String valueType = secRef.getReference().getValueType(); if (valueType != null && !"".equals(valueType)) { bspEnforcer.handleBSPRule(BSPRule.R6614);
STRParserUtil.getSecretKeyFromToken(uri, reference.getValueType(), WSPasswordCallback.SECRET_KEY, data); if (secretKey == null) { Element token = STRParserUtil.getTokenElement(strElement.getOwnerDocument(), wsDocInfo, data.getCallbackHandler(), uri, reference.getValueType()); QName el = new QName(token.getNamespaceURI(), token.getLocalName()); if (el.equals(WSConstants.BINARY_TOKEN)) {
return STRParserUtil.getTokenElement(doc, wsDocInfo, null, reference.getURI(), reference.getValueType()); } else if (secRef.containsX509Data() || secRef.containsX509IssuerSerial()) {
Reference reference = secRef.getReference(); byte[] secretKey = STRParserUtil.getSecretKeyFromToken(uri, reference.getValueType(), WSPasswordCallback.SECRET_KEY, data); Element token = STRParserUtil.getTokenElement(strElement.getOwnerDocument(), wsDocInfo, data.getCallbackHandler(), uri, reference.getValueType()); QName el = new QName(token.getNamespaceURI(), token.getLocalName()); if (el.equals(WSConstants.BINARY_TOKEN)) { STRParserUtil.findProcessedTokenElement( strElement.getOwnerDocument(), wsDocInfo, data.getCallbackHandler(), uri, secRef.getReference().getValueType() ); SamlAssertionWrapper samlAssertion = null;
Element bstElement = STRParserUtil.getTokenElement(strElement.getOwnerDocument(), wsDocInfo, data.getCallbackHandler(), reference.getURI(), reference.getValueType());