Package org.apache.ws.security.processor

Examples of org.apache.ws.security.processor.EncryptedDataProcessor


            && "http://www.w3.org/2001/04/xmlenc#".equals(firstElement.getNamespaceURI())) {
            Node parent = firstElement.getParentNode();
            Node prev = firstElement.getPreviousSibling();

            // encrypted even more. WCF seems to do this periodically
            EncryptedDataProcessor processor = new EncryptedDataProcessor();

            processor.handleToken(firstElement, null, createCrypto(true), createHandler(), null,
                                  new Vector(), null);

            if (prev == null) {
                firstElement = (Element)parent.getFirstChild();
            } else {
View Full Code Here


            && "http://www.w3.org/2001/04/xmlenc#".equals(firstElement.getNamespaceURI())) {
            Node parent = firstElement.getParentNode();
            Node prev = firstElement.getPreviousSibling();

            // encrypted even more. WCF seems to do this periodically
            EncryptedDataProcessor processor = new EncryptedDataProcessor();

            processor.handleToken(firstElement, null, createCrypto(true), createHandler(), null,
                                  new Vector(), null);

            if (prev == null) {
                firstElement = (Element)parent.getFirstChild();
            } else {
View Full Code Here

                "We must have a decryption key password to decrypt encrypted tokens"
            );
            throw new ProcessingException(TYPE.BAD_REQUEST);
        }
       
        EncryptedDataProcessor proc = new EncryptedDataProcessor();
        WSDocInfo docInfo = new WSDocInfo(encryptedRST.getOwnerDocument());
        RequestData data = new RequestData();
       
        // Disable WSS4J processing of the (decrypted) SAML Token
        WSSConfig wssConfig = WSSConfig.getNewInstance();
        wssConfig.setProcessor(WSSecurityEngine.SAML_TOKEN, new NOOpProcessor());
        wssConfig.setProcessor(WSSecurityEngine.SAML2_TOKEN, new NOOpProcessor());
        data.setWssConfig(wssConfig);
       
        data.setDecCrypto(decryptionKeyManager.getCrypto());
        data.setCallbackHandler(new DecryptionCallbackHandler(keyPassword));
        try {
            List<WSSecurityEngineResult> result =
                proc.handleToken(encryptedRST, data, docInfo);
            if (result.size() > 0) {
                @SuppressWarnings("unchecked")
                List<WSDataRef> dataRefs =
                    (List<WSDataRef>)result.get(result.size() - 1).get(WSSecurityEngineResult.TAG_DATA_REF_URIS);
                if (dataRefs != null && dataRefs.size() > 0) {
View Full Code Here

                "We must have a decryption key password to decrypt encrypted tokens"
            );
            throw new ProcessingException(TYPE.BAD_REQUEST);
        }
       
        EncryptedDataProcessor proc = new EncryptedDataProcessor();
        WSDocInfo docInfo = new WSDocInfo(encryptedRST.getOwnerDocument());
        RequestData data = new RequestData();
       
        // Disable WSS4J processing of the (decrypted) SAML Token
        WSSConfig wssConfig = WSSConfig.getNewInstance();
        wssConfig.setProcessor(WSSecurityEngine.SAML_TOKEN, new NOOpProcessor());
        wssConfig.setProcessor(WSSecurityEngine.SAML2_TOKEN, new NOOpProcessor());
        data.setWssConfig(wssConfig);
       
        data.setDecCrypto(decryptionKeyManager.getCrypto());
        data.setCallbackHandler(new DecryptionCallbackHandler(keyPassword));
        try {
            List<WSSecurityEngineResult> result =
                proc.handleToken(encryptedRST, data, docInfo);
            if (result.size() > 0) {
                @SuppressWarnings("unchecked")
                List<WSDataRef> dataRefs =
                    (List<WSDataRef>)result.get(result.size() - 1).get(WSSecurityEngineResult.TAG_DATA_REF_URIS);
                if (dataRefs != null && dataRefs.size() > 0) {
View Full Code Here

            && "http://www.w3.org/2001/04/xmlenc#".equals(firstElement.getNamespaceURI())) {
            Node parent = firstElement.getParentNode();
            Node prev = firstElement.getPreviousSibling();

            // encrypted even more. WCF seems to do this periodically
            EncryptedDataProcessor processor = new EncryptedDataProcessor();

            processor.handleToken(firstElement, null, createCrypto(true), createHandler(), null,
                                  new Vector(), null);

            if (prev == null) {
                firstElement = (Element)parent.getFirstChild();
            } else {
View Full Code Here

TOP

Related Classes of org.apache.ws.security.processor.EncryptedDataProcessor

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.