/** * Creates and adds a Nonce element to this UsernameToken */ public void addNonce(Document doc) { if (elementNonce != null) { return; } byte[] nonceValue = null; try { nonceValue = WSSecurityUtil.generateNonce(16); } catch (WSSecurityException ex) { LOG.debug(ex.getMessage(), ex); return; } elementNonce = doc.createElementNS(WSConstants.WSSE_NS, "wsse:" + WSConstants.NONCE_LN); elementNonce.appendChild(doc.createTextNode(org.apache.xml.security.utils.XMLUtils.encodeToString(nonceValue))); elementNonce.setAttributeNS(null, "EncodingType", BASE64_ENCODING); element.appendChild(elementNonce); }
protected byte[] writeElementsForRSTSymmetricKey(W3CDOMStreamWriter writer, boolean wroteKeySize) throws Exception { byte[] requestorEntropy = null; if (!wroteKeySize) { addKeySize(keySize, writer); } if (requiresEntropy) { writer.writeStartElement("wst", "Entropy", namespace); writer.writeStartElement("wst", "BinarySecret", namespace); writer.writeAttribute("Type", namespace + "/Nonce"); if (algorithmSuite == null) { requestorEntropy = WSSecurityUtil.generateNonce(keySize / 8); } else { AlgorithmSuiteType algType = algorithmSuite.getAlgorithmSuiteType(); requestorEntropy = WSSecurityUtil .generateNonce(algType.getMaximumSymmetricKeyLength() / 8); } writer.writeCharacters(org.apache.xml.security.utils.XMLUtils.encodeToString(requestorEntropy)); writer.writeEndElement(); writer.writeEndElement(); writer.writeStartElement("wst", "ComputedKeyAlgorithm", namespace); writer.writeCharacters(namespace + "/CK/PSHA1"); writer.writeEndElement(); } return requestorEntropy; }
entropyBytes = WSSecurityUtil.generateNonce(keySize / 8); secret = entropyBytes; } catch (WSSecurityException ex) {
protected byte[] writeElementsForRSTSymmetricKey(W3CDOMStreamWriter writer, boolean wroteKeySize) throws Exception { byte[] requestorEntropy = null; if (!wroteKeySize) { addKeySize(keySize, writer); } if (requiresEntropy) { writer.writeStartElement("wst", "Entropy", namespace); writer.writeStartElement("wst", "BinarySecret", namespace); writer.writeAttribute("Type", namespace + "/Nonce"); if (algorithmSuite == null) { requestorEntropy = WSSecurityUtil.generateNonce(keySize / 8); } else { AlgorithmSuiteType algType = algorithmSuite.getAlgorithmSuiteType(); requestorEntropy = WSSecurityUtil .generateNonce(algType.getMaximumSymmetricKeyLength() / 8); } writer.writeCharacters(org.apache.xml.security.utils.XMLUtils.encodeToString(requestorEntropy)); writer.writeEndElement(); writer.writeEndElement(); writer.writeStartElement("wst", "ComputedKeyAlgorithm", namespace); writer.writeCharacters(namespace + "/CK/PSHA1"); writer.writeEndElement(); } return requestorEntropy; }
entropyBytes = WSSecurityUtil.generateNonce(keySize / 8); secret = entropyBytes; } catch (WSSecurityException ex) {
String labelText = clientLabel + serviceLabel; label = labelText.getBytes(StandardCharsets.UTF_8); byte[] nonce = WSSecurityUtil.generateNonce(16);
writer.writeStartElement(prefix, "RequestedProofToken", namespace); if (clientEntropy == null) { secret = WSSecurityUtil.generateNonce(keySize / 8); writer.writeEndElement(); } else { byte[] entropy = WSSecurityUtil.generateNonce(keySize / 8); P_SHA1 psha1 = new P_SHA1(); secret = psha1.createKey(clientEntropy, entropy, 0, keySize / 8);
writer.writeStartElement(prefix, "RequestedProofToken", namespace); if (clientEntropy == null) { secret = WSSecurityUtil.generateNonce(keySize / 8); writer.writeEndElement(); } else { byte[] entropy = WSSecurityUtil.generateNonce(keySize / 8); P_SHA1 psha1 = new P_SHA1(); secret = psha1.createKey(clientEntropy, entropy, 0, keySize / 8);
writer.writeEndElement(); byte[] secret = WSSecurityUtil.generateNonce(keySize / 8); byte[] key = spnegoToken.wrapKey(secret);
writer.writeEndElement(); byte[] secret = WSSecurityUtil.generateNonce(keySize / 8); byte[] key = spnegoToken.wrapKey(secret);