Java Code Examples for org.apache.cxf.ws.security.tokenstore.SecurityToken#getWsuId()
The following examples show how to use
org.apache.cxf.ws.security.tokenstore.SecurityToken#getWsuId() .
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example 1
Source File: TransportBindingHandler.java From steady with Apache License 2.0 | 4 votes |
private byte[] doSignature( boolean tokenIncluded, SecurityToken secTok, Token token, TokenWrapper wrapper, List<WSEncryptionPart> sigParts ) throws Exception { WSSecSignature sig = new WSSecSignature(wssConfig); //Setting the AttachedReference or the UnattachedReference according to the flag Element ref; if (tokenIncluded) { ref = secTok.getAttachedReference(); } else { ref = secTok.getUnattachedReference(); } if (ref != null) { SecurityTokenReference secRef = new SecurityTokenReference(cloneElement(ref), false); sig.setSecurityTokenReference(secRef); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else if (token instanceof UsernameToken) { sig.setCustomTokenId(secTok.getId()); sig.setCustomTokenValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); int type = tokenIncluded ? WSConstants.CUSTOM_SYMM_SIGNING : WSConstants.CUSTOM_SYMM_SIGNING_DIRECT; sig.setKeyIdentifierType(type); } else if (secTok.getTokenType() == null) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { String id = secTok.getWsuId(); if (id == null) { sig.setCustomTokenId(secTok.getId()); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING_DIRECT); } else { sig.setCustomTokenId(secTok.getWsuId()); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } String tokenType = secTok.getTokenType(); if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML2_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { sig.setCustomTokenValueType(tokenType); } } Crypto crypto = null; if (secTok.getSecret() == null) { sig.setX509Certificate(secTok.getX509Certificate()); crypto = secTok.getCrypto(); if (crypto == null) { crypto = getSignatureCrypto(wrapper); } String uname = crypto.getX509Identifier(secTok.getX509Certificate()); if (uname == null) { String userNameKey = SecurityConstants.SIGNATURE_USERNAME; uname = (String)message.getContextualProperty(userNameKey); } String password = getPassword(uname, token, WSPasswordCallback.SIGNATURE); if (password == null) { password = ""; } sig.setUserInfo(uname, password); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getAsymmetricSignature()); } else { crypto = getSignatureCrypto(wrapper); sig.setSecretKey(secTok.getSecret()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getSymmetricSignature()); } sig.setSigCanonicalization(binding.getAlgorithmSuite().getInclusiveC14n()); Document doc = saaj.getSOAPPart(); sig.prepare(doc, crypto, secHeader); sig.setParts(sigParts); List<Reference> referenceList = sig.addReferencesToSign(sigParts, secHeader); //Do signature if (bottomUpElement == null) { sig.computeSignature(referenceList, false, null); } else { sig.computeSignature(referenceList, true, bottomUpElement); } bottomUpElement = sig.getSignatureElement(); mainSigId = sig.getId(); return sig.getSignatureValue(); }
Example 2
Source File: AbstractBindingBuilder.java From steady with Apache License 2.0 | 4 votes |
private void doSymmSignature(Token policyToken, SecurityToken tok, List<WSEncryptionPart> sigParts, boolean isTokenProtection) throws WSSecurityException, ConversationException { Document doc = saaj.getSOAPPart(); WSSecSignature sig = new WSSecSignature(wssConfig); // If a EncryptedKeyToken is used, set the correct value type to // be used in the wsse:Reference in ds:KeyInfo if (policyToken instanceof X509Token) { if (isRequestor()) { // TODO Add support for SAML2 here sig.setCustomTokenValueType( WSConstants.SOAPMESSAGE_NS11 + "#" + WSConstants.ENC_KEY_VALUE_TYPE ); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } else { //the tok has to be an EncryptedKey token sig.setEncrKeySha1value(tok.getSHA1()); sig.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER); } } else { String tokenType = tok.getTokenType(); if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML2_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); } else if (tokenType != null) { sig.setCustomTokenValueType(tokenType); } else if (policyToken instanceof UsernameToken) { sig.setCustomTokenValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); } else { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); } sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } String sigTokId = tok.getWsuId(); if (sigTokId == null) { sigTokId = tok.getId(); } //Hack to handle reference id issues //TODO Need a better fix if (sigTokId.startsWith("#")) { sigTokId = sigTokId.substring(1); } sig.setCustomTokenId(sigTokId); sig.setSecretKey(tok.getSecret()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getAsymmetricSignature()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getSymmetricSignature()); sig.prepare(doc, getSignatureCrypto(null), secHeader); sig.setParts(sigParts); List<Reference> referenceList = sig.addReferencesToSign(sigParts, secHeader); //Do signature sig.computeSignature(referenceList, false, null); signatures.add(sig.getSignatureValue()); }
Example 3
Source File: TransportBindingHandler.java From steady with Apache License 2.0 | 4 votes |
private byte[] doSignature( boolean tokenIncluded, SecurityToken secTok, Token token, TokenWrapper wrapper, List<WSEncryptionPart> sigParts ) throws Exception { WSSecSignature sig = new WSSecSignature(wssConfig); //Setting the AttachedReference or the UnattachedReference according to the flag Element ref; if (tokenIncluded) { ref = secTok.getAttachedReference(); } else { ref = secTok.getUnattachedReference(); } if (ref != null) { SecurityTokenReference secRef = new SecurityTokenReference(cloneElement(ref), false); sig.setSecurityTokenReference(secRef); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else if (token instanceof UsernameToken) { sig.setCustomTokenId(secTok.getId()); sig.setCustomTokenValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); int type = tokenIncluded ? WSConstants.CUSTOM_SYMM_SIGNING : WSConstants.CUSTOM_SYMM_SIGNING_DIRECT; sig.setKeyIdentifierType(type); } else if (secTok.getTokenType() == null) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { String id = secTok.getWsuId(); if (id == null) { sig.setCustomTokenId(secTok.getId()); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING_DIRECT); } else { sig.setCustomTokenId(secTok.getWsuId()); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } String tokenType = secTok.getTokenType(); if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML2_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { sig.setCustomTokenValueType(tokenType); } } Crypto crypto = null; if (secTok.getSecret() == null) { sig.setX509Certificate(secTok.getX509Certificate()); crypto = secTok.getCrypto(); if (crypto == null) { crypto = getSignatureCrypto(wrapper); } String uname = crypto.getX509Identifier(secTok.getX509Certificate()); if (uname == null) { String userNameKey = SecurityConstants.SIGNATURE_USERNAME; uname = (String)message.getContextualProperty(userNameKey); } String password = getPassword(uname, token, WSPasswordCallback.SIGNATURE); if (password == null) { password = ""; } sig.setUserInfo(uname, password); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getAsymmetricSignature()); } else { crypto = getSignatureCrypto(wrapper); sig.setSecretKey(secTok.getSecret()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getSymmetricSignature()); } sig.setSigCanonicalization(binding.getAlgorithmSuite().getInclusiveC14n()); Document doc = saaj.getSOAPPart(); sig.prepare(doc, crypto, secHeader); sig.setParts(sigParts); List<Reference> referenceList = sig.addReferencesToSign(sigParts, secHeader); //Do signature if (bottomUpElement == null) { sig.computeSignature(referenceList, false, null); } else { sig.computeSignature(referenceList, true, bottomUpElement); } bottomUpElement = sig.getSignatureElement(); mainSigId = sig.getId(); return sig.getSignatureValue(); }
Example 4
Source File: AbstractBindingBuilder.java From steady with Apache License 2.0 | 4 votes |
private void doSymmSignature(Token policyToken, SecurityToken tok, List<WSEncryptionPart> sigParts, boolean isTokenProtection) throws WSSecurityException, ConversationException { Document doc = saaj.getSOAPPart(); WSSecSignature sig = new WSSecSignature(wssConfig); // If a EncryptedKeyToken is used, set the correct value type to // be used in the wsse:Reference in ds:KeyInfo if (policyToken instanceof X509Token) { if (isRequestor()) { // TODO Add support for SAML2 here sig.setCustomTokenValueType( WSConstants.SOAPMESSAGE_NS11 + "#" + WSConstants.ENC_KEY_VALUE_TYPE ); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } else { //the tok has to be an EncryptedKey token sig.setEncrKeySha1value(tok.getSHA1()); sig.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER); } } else { String tokenType = tok.getTokenType(); if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML2_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); } else if (tokenType != null) { sig.setCustomTokenValueType(tokenType); } else if (policyToken instanceof UsernameToken) { sig.setCustomTokenValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); } else { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); } sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } String sigTokId = tok.getWsuId(); if (sigTokId == null) { sigTokId = tok.getId(); } //Hack to handle reference id issues //TODO Need a better fix if (sigTokId.startsWith("#")) { sigTokId = sigTokId.substring(1); } sig.setCustomTokenId(sigTokId); sig.setSecretKey(tok.getSecret()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getAsymmetricSignature()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getSymmetricSignature()); sig.prepare(doc, getSignatureCrypto(null), secHeader); sig.setParts(sigParts); List<Reference> referenceList = sig.addReferencesToSign(sigParts, secHeader); //Do signature sig.computeSignature(referenceList, false, null); signatures.add(sig.getSignatureValue()); }
Example 5
Source File: TransportBindingHandler.java From steady with Apache License 2.0 | 4 votes |
private byte[] doSignature( boolean tokenIncluded, SecurityToken secTok, Token token, TokenWrapper wrapper, List<WSEncryptionPart> sigParts ) throws Exception { WSSecSignature sig = new WSSecSignature(wssConfig); //Setting the AttachedReference or the UnattachedReference according to the flag Element ref; if (tokenIncluded) { ref = secTok.getAttachedReference(); } else { ref = secTok.getUnattachedReference(); } if (ref != null) { SecurityTokenReference secRef = new SecurityTokenReference(cloneElement(ref), false); sig.setSecurityTokenReference(secRef); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else if (token instanceof UsernameToken) { sig.setCustomTokenId(secTok.getId()); sig.setCustomTokenValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); int type = tokenIncluded ? WSConstants.CUSTOM_SYMM_SIGNING : WSConstants.CUSTOM_SYMM_SIGNING_DIRECT; sig.setKeyIdentifierType(type); } else if (secTok.getTokenType() == null) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { String id = secTok.getWsuId(); if (id == null) { sig.setCustomTokenId(secTok.getId()); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING_DIRECT); } else { sig.setCustomTokenId(secTok.getWsuId()); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } String tokenType = secTok.getTokenType(); if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML2_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { sig.setCustomTokenValueType(tokenType); } } Crypto crypto = null; if (secTok.getSecret() == null) { sig.setX509Certificate(secTok.getX509Certificate()); crypto = secTok.getCrypto(); if (crypto == null) { crypto = getSignatureCrypto(wrapper); } String uname = crypto.getX509Identifier(secTok.getX509Certificate()); if (uname == null) { String userNameKey = SecurityConstants.SIGNATURE_USERNAME; uname = (String)message.getContextualProperty(userNameKey); } String password = getPassword(uname, token, WSPasswordCallback.SIGNATURE); if (password == null) { password = ""; } sig.setUserInfo(uname, password); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getAsymmetricSignature()); } else { crypto = getSignatureCrypto(wrapper); sig.setSecretKey(secTok.getSecret()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getSymmetricSignature()); } sig.setSigCanonicalization(binding.getAlgorithmSuite().getInclusiveC14n()); Document doc = saaj.getSOAPPart(); sig.prepare(doc, crypto, secHeader); sig.setParts(sigParts); List<Reference> referenceList = sig.addReferencesToSign(sigParts, secHeader); //Do signature if (bottomUpElement == null) { sig.computeSignature(referenceList, false, null); } else { sig.computeSignature(referenceList, true, bottomUpElement); } bottomUpElement = sig.getSignatureElement(); mainSigId = sig.getId(); return sig.getSignatureValue(); }
Example 6
Source File: AbstractBindingBuilder.java From steady with Apache License 2.0 | 4 votes |
private void doSymmSignature(Token policyToken, SecurityToken tok, List<WSEncryptionPart> sigParts, boolean isTokenProtection) throws WSSecurityException, ConversationException { Document doc = saaj.getSOAPPart(); WSSecSignature sig = new WSSecSignature(wssConfig); // If a EncryptedKeyToken is used, set the correct value type to // be used in the wsse:Reference in ds:KeyInfo if (policyToken instanceof X509Token) { if (isRequestor()) { // TODO Add support for SAML2 here sig.setCustomTokenValueType( WSConstants.SOAPMESSAGE_NS11 + "#" + WSConstants.ENC_KEY_VALUE_TYPE ); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } else { //the tok has to be an EncryptedKey token sig.setEncrKeySha1value(tok.getSHA1()); sig.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER); } } else { String tokenType = tok.getTokenType(); if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML2_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); } else if (tokenType != null) { sig.setCustomTokenValueType(tokenType); } else if (policyToken instanceof UsernameToken) { sig.setCustomTokenValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); } else { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); } sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } String sigTokId = tok.getWsuId(); if (sigTokId == null) { sigTokId = tok.getId(); } //Hack to handle reference id issues //TODO Need a better fix if (sigTokId.startsWith("#")) { sigTokId = sigTokId.substring(1); } sig.setCustomTokenId(sigTokId); sig.setSecretKey(tok.getSecret()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getAsymmetricSignature()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getSymmetricSignature()); sig.prepare(doc, getSignatureCrypto(null), secHeader); sig.setParts(sigParts); List<Reference> referenceList = sig.addReferencesToSign(sigParts, secHeader); //Do signature sig.computeSignature(referenceList, false, null); signatures.add(sig.getSignatureValue()); }
Example 7
Source File: TransportBindingHandler.java From steady with Apache License 2.0 | 4 votes |
private byte[] doSignature( boolean tokenIncluded, SecurityToken secTok, Token token, TokenWrapper wrapper, List<WSEncryptionPart> sigParts ) throws Exception { WSSecSignature sig = new WSSecSignature(wssConfig); //Setting the AttachedReference or the UnattachedReference according to the flag Element ref; if (tokenIncluded) { ref = secTok.getAttachedReference(); } else { ref = secTok.getUnattachedReference(); } if (ref != null) { SecurityTokenReference secRef = new SecurityTokenReference(cloneElement(ref), false); sig.setSecurityTokenReference(secRef); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else if (token instanceof UsernameToken) { sig.setCustomTokenId(secTok.getId()); sig.setCustomTokenValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); int type = tokenIncluded ? WSConstants.CUSTOM_SYMM_SIGNING : WSConstants.CUSTOM_SYMM_SIGNING_DIRECT; sig.setKeyIdentifierType(type); } else if (secTok.getTokenType() == null) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { String id = secTok.getWsuId(); if (id == null) { sig.setCustomTokenId(secTok.getId()); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING_DIRECT); } else { sig.setCustomTokenId(secTok.getWsuId()); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } String tokenType = secTok.getTokenType(); if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML2_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { sig.setCustomTokenValueType(tokenType); } } Crypto crypto = null; if (secTok.getSecret() == null) { sig.setX509Certificate(secTok.getX509Certificate()); crypto = secTok.getCrypto(); if (crypto == null) { crypto = getSignatureCrypto(wrapper); } String uname = crypto.getX509Identifier(secTok.getX509Certificate()); if (uname == null) { String userNameKey = SecurityConstants.SIGNATURE_USERNAME; uname = (String)message.getContextualProperty(userNameKey); } String password = getPassword(uname, token, WSPasswordCallback.SIGNATURE); if (password == null) { password = ""; } sig.setUserInfo(uname, password); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getAsymmetricSignature()); } else { crypto = getSignatureCrypto(wrapper); sig.setSecretKey(secTok.getSecret()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getSymmetricSignature()); } sig.setSigCanonicalization(binding.getAlgorithmSuite().getInclusiveC14n()); Document doc = saaj.getSOAPPart(); sig.prepare(doc, crypto, secHeader); sig.setParts(sigParts); List<Reference> referenceList = sig.addReferencesToSign(sigParts, secHeader); //Do signature if (bottomUpElement == null) { sig.computeSignature(referenceList, false, null); } else { sig.computeSignature(referenceList, true, bottomUpElement); } bottomUpElement = sig.getSignatureElement(); mainSigId = sig.getId(); return sig.getSignatureValue(); }
Example 8
Source File: AbstractBindingBuilder.java From steady with Apache License 2.0 | 4 votes |
private void doSymmSignature(Token policyToken, SecurityToken tok, List<WSEncryptionPart> sigParts, boolean isTokenProtection) throws WSSecurityException, ConversationException { Document doc = saaj.getSOAPPart(); WSSecSignature sig = new WSSecSignature(wssConfig); // If a EncryptedKeyToken is used, set the correct value type to // be used in the wsse:Reference in ds:KeyInfo if (policyToken instanceof X509Token) { if (isRequestor()) { // TODO Add support for SAML2 here sig.setCustomTokenValueType( WSConstants.SOAPMESSAGE_NS11 + "#" + WSConstants.ENC_KEY_VALUE_TYPE ); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } else { //the tok has to be an EncryptedKey token sig.setEncrKeySha1value(tok.getSHA1()); sig.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER); } } else { String tokenType = tok.getTokenType(); if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) || WSConstants.SAML2_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); } else if (tokenType != null) { sig.setCustomTokenValueType(tokenType); } else if (policyToken instanceof UsernameToken) { sig.setCustomTokenValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); } else { sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); } sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } String sigTokId = tok.getWsuId(); if (sigTokId == null) { sigTokId = tok.getId(); } //Hack to handle reference id issues //TODO Need a better fix if (sigTokId.startsWith("#")) { sigTokId = sigTokId.substring(1); } sig.setCustomTokenId(sigTokId); sig.setSecretKey(tok.getSecret()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getAsymmetricSignature()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getSymmetricSignature()); sig.prepare(doc, getSignatureCrypto(null), secHeader); sig.setParts(sigParts); List<Reference> referenceList = sig.addReferencesToSign(sigParts, secHeader); //Do signature sig.computeSignature(referenceList, false, null); signatures.add(sig.getSignatureValue()); }
Example 9
Source File: AbstractBindingBuilder.java From cxf with Apache License 2.0 | 4 votes |
private void doSymmSignature(AbstractToken policyToken, SecurityToken tok, List<WSEncryptionPart> sigParts, boolean isSigProtect) throws WSSecurityException { WSSecSignature sig = new WSSecSignature(secHeader); sig.setIdAllocator(wssConfig.getIdAllocator()); sig.setCallbackLookup(callbackLookup); sig.setAttachmentCallbackHandler(new AttachmentCallbackHandler(message)); sig.setStoreBytesInAttachment(storeBytesInAttachment); sig.setExpandXopInclude(isExpandXopInclude()); sig.setWsDocInfo(wsDocInfo); // If a EncryptedKeyToken is used, set the correct value type to // be used in the wsse:Reference in ds:KeyInfo if (policyToken instanceof X509Token) { if (isRequestor()) { // TODO Add support for SAML2 here sig.setCustomTokenValueType( WSS4JConstants.SOAPMESSAGE_NS11 + "#" + WSS4JConstants.ENC_KEY_VALUE_TYPE ); sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } else { //the tok has to be an EncryptedKey token sig.setEncrKeySha1value(tok.getSHA1()); sig.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER); } } else { String tokenType = tok.getTokenType(); if (WSS4JConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) || WSS4JConstants.SAML_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSS4JConstants.WSS_SAML_KI_VALUE_TYPE); } else if (WSS4JConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) || WSS4JConstants.SAML2_NS.equals(tokenType)) { sig.setCustomTokenValueType(WSS4JConstants.WSS_SAML2_KI_VALUE_TYPE); } else if (tokenType != null) { sig.setCustomTokenValueType(tokenType); } else if (policyToken instanceof UsernameToken) { sig.setCustomTokenValueType(WSS4JConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); } else { sig.setCustomTokenValueType(WSS4JConstants.WSS_SAML_KI_VALUE_TYPE); } sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } String sigTokId = tok.getWsuId(); if (sigTokId == null) { sigTokId = tok.getId(); } sigTokId = XMLUtils.getIDFromReference(sigTokId); sig.setCustomTokenId(sigTokId); sig.setSecretKey(tok.getSecret()); sig.setSignatureAlgorithm(binding.getAlgorithmSuite().getAlgorithmSuiteType().getSymmetricSignature()); AlgorithmSuiteType algType = binding.getAlgorithmSuite().getAlgorithmSuiteType(); sig.setDigestAlgo(algType.getDigest()); sig.setSigCanonicalization(binding.getAlgorithmSuite().getC14n().getValue()); sig.prepare(getSignatureCrypto()); sig.getParts().addAll(sigParts); List<Reference> referenceList = sig.addReferencesToSign(sigParts); //Do signature sig.computeSignature(referenceList, false, null); if (isSigProtect) { WSEncryptionPart part = new WSEncryptionPart(sig.getId(), "Element"); encryptedTokensList.add(part); } addSig(sig.getSignatureValue()); }