|
||||||||||
PREV NEXT | FRAMES NO FRAMES |
Uses of WSSecurityException in org.apache.ws.security |
---|
Methods in org.apache.ws.security that throw WSSecurityException | |
---|---|
void |
WSDocInfo.addTokenElement(org.w3c.dom.Element element)
Store a token element for later retrieval. |
void |
WSDocInfo.addTokenElement(org.w3c.dom.Element element,
boolean checkMultipleElements)
Store a token element for later retrieval. |
Action |
WSSConfig.getAction(int action)
Lookup action |
Processor |
WSSConfig.getProcessor(javax.xml.namespace.QName el)
|
Validator |
WSSConfig.getValidator(javax.xml.namespace.QName el)
|
java.util.List<WSSecurityEngineResult> |
WSSecurityEngine.processSecurityHeader(org.w3c.dom.Document doc,
java.lang.String actor,
javax.security.auth.callback.CallbackHandler cb,
Crypto crypto)
Process the security header given the soap envelope as W3C document. |
java.util.List<WSSecurityEngineResult> |
WSSecurityEngine.processSecurityHeader(org.w3c.dom.Document doc,
java.lang.String actor,
javax.security.auth.callback.CallbackHandler cb,
Crypto sigCrypto,
Crypto decCrypto)
Process the security header given the soap envelope as W3C document. |
java.util.List<WSSecurityEngineResult> |
WSSecurityEngine.processSecurityHeader(org.w3c.dom.Element securityHeader,
javax.security.auth.callback.CallbackHandler cb,
Crypto sigCrypto,
Crypto decCrypto)
Process the security header given the wsse:Security DOM
Element. |
java.util.List<WSSecurityEngineResult> |
WSSecurityEngine.processSecurityHeader(org.w3c.dom.Element securityHeader,
RequestData requestData)
Process the security header given the wsse:Security DOM
Element. |
Uses of WSSecurityException in org.apache.ws.security.action |
---|
Methods in org.apache.ws.security.action that throw WSSecurityException | |
---|---|
void |
SAMLTokenUnsignedAction.execute(WSHandler handler,
int actionToDo,
org.w3c.dom.Document doc,
RequestData reqData)
|
void |
UsernameTokenSignedAction.execute(WSHandler handler,
int actionToDo,
org.w3c.dom.Document doc,
RequestData reqData)
|
void |
SAMLTokenSignedAction.execute(WSHandler handler,
int actionToDo,
org.w3c.dom.Document doc,
RequestData reqData)
|
void |
TimestampAction.execute(WSHandler handler,
int actionToDo,
org.w3c.dom.Document doc,
RequestData reqData)
|
void |
Action.execute(WSHandler handler,
int actionToDo,
org.w3c.dom.Document doc,
RequestData reqData)
|
void |
UsernameTokenAction.execute(WSHandler handler,
int actionToDo,
org.w3c.dom.Document doc,
RequestData reqData)
|
void |
EncryptionAction.execute(WSHandler handler,
int actionToDo,
org.w3c.dom.Document doc,
RequestData reqData)
|
void |
SignatureAction.execute(WSHandler handler,
int actionToDo,
org.w3c.dom.Document doc,
RequestData reqData)
|
void |
SignatureConfirmationAction.execute(WSHandler handler,
int actionToDo,
org.w3c.dom.Document doc,
RequestData reqData)
|
protected SAMLIssuer |
SAMLTokenSignedAction.loadSamlIssuer(WSHandler handler,
RequestData reqData)
|
Uses of WSSecurityException in org.apache.ws.security.components.crypto |
---|
Methods in org.apache.ws.security.components.crypto that throw WSSecurityException | |
---|---|
void |
DERDecoder.expect(byte val)
Confirm that the byte at the current position matches the given value. |
void |
DERDecoder.expect(int val)
Confirm that the byte at the current position matches the given value. |
byte[] |
DERDecoder.getBytes(int length)
Return an array of bytes from the current position. |
byte[] |
CryptoBase.getBytesFromCertificates(java.security.cert.X509Certificate[] certs)
Get a byte array given an array of X509 certificates. |
byte[] |
Crypto.getBytesFromCertificates(java.security.cert.X509Certificate[] certs)
Get a byte array given an array of X509 certificates. |
java.security.cert.CertificateFactory |
CryptoBase.getCertificateFactory()
Get the CertificateFactory instance on this Crypto instance |
java.security.cert.CertificateFactory |
Merlin.getCertificateFactory()
Singleton certificate factory for this Crypto instance. |
java.security.cert.CertificateFactory |
Crypto.getCertificateFactory()
Get the CertificateFactory instance on this Crypto instance |
java.security.cert.X509Certificate[] |
CryptoBase.getCertificatesFromBytes(byte[] data)
Construct an array of X509Certificate's from the byte array. |
java.security.cert.X509Certificate[] |
Crypto.getCertificatesFromBytes(byte[] data)
Construct an array of X509Certificate's from the byte array. |
java.lang.String |
CryptoBase.getDefaultX509Identifier()
Retrieves the identifier name of the default certificate. |
java.lang.String |
Merlin.getDefaultX509Identifier()
Retrieves the identifier name of the default certificate. |
java.lang.String |
Crypto.getDefaultX509Identifier()
Retrieves the identifier name of the default certificate. |
static Crypto |
CryptoFactory.getInstance()
getInstance Returns an instance of Crypto. |
static Crypto |
CryptoFactory.getInstance(java.lang.Class<? extends Crypto> cryptoClass,
java.util.Map<java.lang.Object,java.lang.Object> map)
getInstance Returns an instance of Crypto. |
static Crypto |
CryptoFactory.getInstance(java.util.Properties properties)
getInstance Returns an instance of Crypto. |
static Crypto |
CryptoFactory.getInstance(java.util.Properties properties,
java.lang.ClassLoader classLoader)
getInstance Returns an instance of Crypto loaded with the given classloader. |
static Crypto |
CryptoFactory.getInstance(java.lang.String propFilename)
getInstance Returns an instance of Crypto. |
static Crypto |
CryptoFactory.getInstance(java.lang.String propFilename,
java.lang.ClassLoader customClassLoader)
|
int |
DERDecoder.getLength()
Get the DER length at the current position. |
java.security.PrivateKey |
CertificateStore.getPrivateKey(java.lang.String identifier,
java.lang.String password)
Gets the private key corresponding to the identifier. |
java.security.PrivateKey |
Merlin.getPrivateKey(java.lang.String identifier,
java.lang.String password)
Gets the private key corresponding to the identifier. |
java.security.PrivateKey |
Crypto.getPrivateKey(java.lang.String identifier,
java.lang.String password)
Gets the private key corresponding to the identifier. |
java.security.PrivateKey |
CertificateStore.getPrivateKey(java.security.cert.X509Certificate certificate,
javax.security.auth.callback.CallbackHandler callbackHandler)
Gets the private key corresponding to the certificate. |
java.security.PrivateKey |
Merlin.getPrivateKey(java.security.cert.X509Certificate certificate,
javax.security.auth.callback.CallbackHandler callbackHandler)
Gets the private key corresponding to the certificate. |
java.security.PrivateKey |
Crypto.getPrivateKey(java.security.cert.X509Certificate certificate,
javax.security.auth.callback.CallbackHandler callbackHandler)
Gets the private key corresponding to the certificate. |
byte[] |
CryptoBase.getSKIBytesFromCert(java.security.cert.X509Certificate cert)
Reads the SubjectKeyIdentifier information from the certificate. |
byte[] |
Crypto.getSKIBytesFromCert(java.security.cert.X509Certificate cert)
Reads the SubjectKeyIdentifier information from the certificate. |
byte[] |
X509SubjectPublicKeyInfo.getSubjectPublicKey()
Get the subjectPublicKey element of the SubjectPublicKeyInfo. |
java.security.cert.X509Certificate[] |
CertificateStore.getX509Certificates(CryptoType cryptoType)
Get an X509Certificate (chain) corresponding to the CryptoType argument. |
java.security.cert.X509Certificate[] |
Merlin.getX509Certificates(CryptoType cryptoType)
Get an X509Certificate (chain) corresponding to the CryptoType argument. |
java.security.cert.X509Certificate[] |
Crypto.getX509Certificates(CryptoType cryptoType)
Get an X509Certificate (chain) corresponding to the CryptoType argument. |
java.lang.String |
CertificateStore.getX509Identifier(java.security.cert.X509Certificate cert)
Get the implementation-specific identifier corresponding to the cert parameter. |
java.lang.String |
Merlin.getX509Identifier(java.security.cert.X509Certificate cert)
Get the implementation-specific identifier corresponding to the cert parameter. |
java.lang.String |
Crypto.getX509Identifier(java.security.cert.X509Certificate cert)
Get the implementation-specific identifier corresponding to the cert parameter, e.g. |
java.security.cert.X509Certificate |
CryptoBase.loadCertificate(java.io.InputStream in)
Load a X509Certificate from the input stream. |
java.security.cert.X509Certificate |
Crypto.loadCertificate(java.io.InputStream in)
Load a X509Certificate from the input stream. |
void |
DERDecoder.skip(int length)
Advance the current position by the given number of bytes. |
boolean |
DERDecoder.test(byte val)
Test if the byte at the current position matches the given value. |
boolean |
CertificateStore.verifyTrust(java.security.PublicKey publicKey)
Evaluate whether a given public key should be trusted. |
boolean |
Merlin.verifyTrust(java.security.PublicKey publicKey)
Evaluate whether a given public key should be trusted. |
boolean |
Crypto.verifyTrust(java.security.PublicKey publicKey)
Evaluate whether a given public key should be trusted. |
boolean |
CertificateStore.verifyTrust(java.security.cert.X509Certificate[] certs)
Deprecated. |
boolean |
Merlin.verifyTrust(java.security.cert.X509Certificate[] certs)
Deprecated. |
boolean |
Crypto.verifyTrust(java.security.cert.X509Certificate[] certs)
Deprecated. |
boolean |
CertificateStore.verifyTrust(java.security.cert.X509Certificate[] certs,
boolean enableRevocation)
Evaluate whether a given certificate chain should be trusted. |
boolean |
Merlin.verifyTrust(java.security.cert.X509Certificate[] certs,
boolean enableRevocation)
Evaluate whether a given certificate chain should be trusted. |
boolean |
Crypto.verifyTrust(java.security.cert.X509Certificate[] certs,
boolean enableRevocation)
Evaluate whether a given certificate chain should be trusted. |
Constructors in org.apache.ws.security.components.crypto that throw WSSecurityException | |
---|---|
DERDecoder(byte[] derEncoded)
Construct a DERDecoder for the given byte array. |
|
X509SubjectPublicKeyInfo(byte[] x509EncodedPublicKey)
Construct a SubjectPublicKeyInfo for the given X.509-encoded public key. |
|
X509SubjectPublicKeyInfo(java.security.PublicKey key)
Construct a SubjectPublicKeyInfo for the given public key. |
Uses of WSSecurityException in org.apache.ws.security.handler |
---|
Methods in org.apache.ws.security.handler that throw WSSecurityException | |
---|---|
protected void |
WSHandler.checkSignatureConfirmation(RequestData reqData,
java.util.List<WSSecurityEngineResult> resultList)
|
protected boolean |
WSHandler.decodeBooleanConfigValue(RequestData reqData,
java.lang.String configTag,
boolean defaultToTrue)
|
protected boolean |
WSHandler.decodeBSPCompliance(RequestData reqData)
|
protected boolean |
WSHandler.decodeCustomPasswordTypes(RequestData reqData)
|
protected void |
WSHandler.decodeDecryptionParameter(RequestData reqData)
|
protected boolean |
WSHandler.decodeEnableSignatureConfirmation(RequestData reqData)
|
protected void |
WSHandler.decodeEncryptionParameter(RequestData reqData)
|
protected boolean |
WSHandler.decodeMustUnderstand(RequestData reqData)
|
protected boolean |
WSHandler.decodeNamespaceQualifiedPasswordTypes(RequestData reqData)
|
protected java.lang.String |
WSHandler.decodePasswordType(RequestData reqData)
|
protected boolean |
WSHandler.decodePasswordTypeStrict(RequestData reqData)
|
protected void |
WSHandler.decodeSignatureParameter(RequestData reqData)
|
protected void |
WSHandler.decodeSignatureParameter2(RequestData reqData)
|
protected boolean |
WSHandler.decodeTimestampPrecision(RequestData reqData)
|
protected boolean |
WSHandler.decodeTimestampStrict(RequestData reqData)
|
protected boolean |
WSHandler.decodeUseEncodedPasswords(RequestData reqData)
|
protected boolean |
WSHandler.decodeUseSingleCertificate(RequestData reqData)
|
protected void |
WSHandler.decodeUTParameter(RequestData reqData)
|
protected void |
WSHandler.doReceiverAction(int doAction,
RequestData reqData)
|
protected void |
WSHandler.doSenderAction(int doAction,
org.w3c.dom.Document doc,
RequestData reqData,
java.util.List<java.lang.Integer> actions,
boolean isRequest)
Performs all defined security actions to set-up the SOAP request. |
javax.security.auth.callback.CallbackHandler |
WSHandler.getCallbackHandler(java.lang.String callbackHandlerClass,
java.lang.String callbackHandlerRef,
RequestData requestData)
Get a CallbackHandler instance. |
javax.security.auth.callback.CallbackHandler |
WSHandler.getPasswordCallbackHandler(RequestData reqData)
Get a CallbackHandler instance to obtain passwords. |
WSPasswordCallback |
WSHandler.getPasswordCB(java.lang.String username,
int doAction,
javax.security.auth.callback.CallbackHandler callbackHandler,
RequestData requestData)
Get a password callback (WSPasswordCallback object) from a CallbackHandler instance |
Validator |
RequestData.getValidator(javax.xml.namespace.QName qName)
Get the Validator instance corresponding to the QName |
protected Crypto |
WSHandler.loadCrypto(java.lang.String cryptoPropertyFile,
java.lang.String cryptoPropertyRefId,
RequestData requestData)
Load a Crypto instance. |
protected Crypto |
WSHandler.loadCryptoFromPropertiesFile(java.lang.String propFilename,
RequestData reqData)
A hook to allow subclass to load Crypto instances from property files in a different way. |
protected Crypto |
WSHandler.loadDecryptionCrypto(RequestData requestData)
Hook to allow subclasses to load their Decryption Crypto however they see fit. |
protected Crypto |
WSHandler.loadEncryptionCrypto(RequestData requestData)
Hook to allow subclasses to load their Encryption Crypto however they see fit. |
Crypto |
WSHandler.loadSignatureCrypto(RequestData requestData)
Hook to allow subclasses to load their Signature Crypto however they see fit. |
Uses of WSSecurityException in org.apache.ws.security.message |
---|
Methods in org.apache.ws.security.message that throw WSSecurityException | |
---|---|
java.util.List<javax.xml.crypto.dsig.Reference> |
WSSecSignatureBase.addReferencesToSign(org.w3c.dom.Document doc,
java.util.List<WSEncryptionPart> references,
WSDocInfo wsDocInfo,
javax.xml.crypto.dsig.XMLSignatureFactory signatureFactory,
WSSecHeader secHeader,
WSSConfig wssConfig,
java.lang.String digestAlgo)
This method adds references to the Signature. |
java.util.List<javax.xml.crypto.dsig.Reference> |
WSSecDKSign.addReferencesToSign(java.util.List<WSEncryptionPart> references,
WSSecHeader secHeader)
This method adds references to the Signature. |
java.util.List<javax.xml.crypto.dsig.Reference> |
WSSecSignature.addReferencesToSign(java.util.List<WSEncryptionPart> references,
WSSecHeader secHeader)
This method adds references to the Signature. |
org.w3c.dom.Document |
WSSecEncrypt.build(org.w3c.dom.Document doc,
Crypto crypto,
WSSecHeader secHeader)
Builds the SOAP envelope with encrypted Body and adds encrypted key. |
org.w3c.dom.Document |
WSSecSignature.build(org.w3c.dom.Document doc,
Crypto cr,
WSSecHeader secHeader)
Builds a signed soap envelope. |
org.w3c.dom.Document |
WSSecDKSign.build(org.w3c.dom.Document doc,
WSSecHeader secHeader)
|
org.w3c.dom.Document |
WSSecDKEncrypt.build(org.w3c.dom.Document doc,
WSSecHeader secHeader)
|
void |
WSSecDKSign.computeSignature(java.util.List<javax.xml.crypto.dsig.Reference> referenceList)
Compute the Signature over the references. |
void |
WSSecSignature.computeSignature(java.util.List<javax.xml.crypto.dsig.Reference> referenceList)
Compute the Signature over the references. |
void |
WSSecDKSign.computeSignature(java.util.List<javax.xml.crypto.dsig.Reference> referenceList,
boolean prepend,
org.w3c.dom.Element siblingElement)
Compute the Signature over the references. |
void |
WSSecSignature.computeSignature(java.util.List<javax.xml.crypto.dsig.Reference> referenceList,
boolean prepend,
org.w3c.dom.Element siblingElement)
Compute the Signature over the references. |
static java.util.List<java.lang.String> |
WSSecEncrypt.doEncryption(org.w3c.dom.Document doc,
WSSConfig config,
org.apache.xml.security.keys.KeyInfo keyInfo,
javax.crypto.SecretKey secretKey,
java.lang.String encryptionAlgorithm,
java.util.List<WSEncryptionPart> references,
CallbackLookup callbackLookup)
Perform encryption on the SOAP envelope. |
org.w3c.dom.Element |
WSSecEncrypt.encryptForExternalRef(org.w3c.dom.Element dataRef,
java.util.List<WSEncryptionPart> references)
Deprecated. Use encryptForRef(dataRef, references) instead |
org.w3c.dom.Element |
WSSecDKEncrypt.encryptForExternalRef(org.w3c.dom.Element dataRef,
java.util.List<WSEncryptionPart> references)
Encrypt one or more parts or elements of the message (external). |
org.w3c.dom.Element |
WSSecEncrypt.encryptForInternalRef(org.w3c.dom.Element dataRef,
java.util.List<WSEncryptionPart> references)
Deprecated. Use encryptForRef(dataRef, references) instead |
org.w3c.dom.Element |
WSSecEncrypt.encryptForRef(org.w3c.dom.Element dataRef,
java.util.List<WSEncryptionPart> references)
Encrypt one or more parts or elements of the message. |
protected byte[] |
WSSecEncryptedKey.generateEphemeralKey()
Create an ephemeral key |
byte[] |
WSSecUsernameToken.getDerivedKey()
Get the derived key. |
protected int |
WSSecDKSign.getDerivedKeyLength()
|
protected int |
WSSecDKEncrypt.getDerivedKeyLength()
|
protected abstract int |
WSSecDerivedKeyBase.getDerivedKeyLength()
The derived key will change depending on the sig/encr algorithm. |
org.w3c.dom.Element |
CallbackLookup.getElement(java.lang.String id,
java.lang.String valueType,
boolean checkMultipleElements)
Get the DOM element that corresponds to the given id and ValueType reference. |
org.w3c.dom.Element |
DOMCallbackLookup.getElement(java.lang.String id,
java.lang.String valueType,
boolean checkMultipleElements)
Get the DOM element that corresponds to the given id and ValueType reference. |
java.util.List<org.w3c.dom.Element> |
CallbackLookup.getElements(java.lang.String localname,
java.lang.String namespace)
Get the DOM element(s) that correspond to the given localname/namespace. |
java.util.List<org.w3c.dom.Element> |
DOMCallbackLookup.getElements(java.lang.String localname,
java.lang.String namespace)
Get the DOM element(s) that correspond to the given localname/namespace. |
byte[] |
WSSecUsernameToken.getSecretKey()
Get the derived secret key. |
org.w3c.dom.Element |
WSSecHeader.insertSecurityHeader(org.w3c.dom.Document doc)
Creates a security header and inserts it as child into the SOAP Envelope. |
boolean |
WSSecHeader.isEmpty(org.w3c.dom.Document doc)
Returns whether the security header is empty |
void |
WSSecDerivedKeyBase.prepare(org.w3c.dom.Document doc)
Initialize a WSSec Derived key. |
void |
WSSecEncrypt.prepare(org.w3c.dom.Document doc,
Crypto crypto)
Initialize a WSSec Encrypt. |
void |
WSSecSecurityContextToken.prepare(org.w3c.dom.Document doc,
Crypto crypto)
|
void |
WSSecEncryptedKey.prepare(org.w3c.dom.Document doc,
Crypto crypto)
Prepare the ephemeralKey and the tokens required to be added to the security header |
void |
WSSecSignature.prepare(org.w3c.dom.Document doc,
Crypto cr,
WSSecHeader secHeader)
Initialize a WSSec Signature. |
void |
WSSecDKSign.prepare(org.w3c.dom.Document doc,
WSSecHeader secHeader)
|
protected void |
WSSecEncryptedKey.prepareInternal(byte[] keyBytes,
java.security.cert.X509Certificate remoteCert,
Crypto crypto)
Encrypt the symmetric key data and prepare the EncryptedKey element This method does the most work for to prepare the EncryptedKey element. |
void |
WSSecSecurityContextToken.prependSCTElementToHeader(org.w3c.dom.Document doc,
WSSecHeader secHeader)
|
void |
WSSecHeader.removeSecurityHeader(org.w3c.dom.Document doc)
|
void |
WSSecEncryptedKey.setKeySize(int keySize)
|
Uses of WSSecurityException in org.apache.ws.security.message.token |
---|
Methods in org.apache.ws.security.message.token that throw WSSecurityException | |
---|---|
java.security.Principal |
DerivedKeyToken.createPrincipal()
Create a WSDerivedKeyTokenPrincipal from this DerivedKeyToken object |
byte[] |
DerivedKeyToken.deriveKey(int length,
byte[] secret)
Derive a key from this DerivedKeyToken instance |
org.w3c.dom.Element |
SecurityTokenReference.findProcessedTokenElement(org.w3c.dom.Document doc,
WSDocInfo docInfo,
javax.security.auth.callback.CallbackHandler cb,
java.lang.String uri,
java.lang.String type)
Find a token that has been processed already - in other words, it access previous results to find the element, rather than conducting a general search |
org.w3c.dom.Element |
SecurityTokenReference.findUnprocessedTokenElement(org.w3c.dom.Document doc,
WSDocInfo docInfo,
javax.security.auth.callback.CallbackHandler cb,
java.lang.String uri,
java.lang.String type)
Find a token that has not been processed already - in other words, it searches for the element, rather than trying to access previous results to find the element |
static byte[] |
UsernameToken.generateDerivedKey(byte[] password,
byte[] salt,
int iteration)
This static method generates a derived key as defined in WSS Username Token Profile. |
static byte[] |
UsernameToken.generateDerivedKey(java.lang.String password,
byte[] salt,
int iteration)
This static method generates a derived key as defined in WSS Username Token Profile. |
byte[] |
UsernameToken.getDerivedKey()
This method gets a derived key as defined in WSS Username Token Profile. |
java.security.cert.X509Certificate[] |
SecurityTokenReference.getKeyIdentifier(Crypto crypto)
Gets the KeyIdentifier. |
Reference |
SecurityTokenReference.getReference()
Gets the Reference. |
byte[] |
UsernameToken.getSalt()
Get the Salt value of this UsernameToken. |
SecurityTokenReference |
DerivedKeyToken.getSecurityTokenReference()
Returns the SecurityTokenReference of the derived key token |
org.w3c.dom.Element |
SecurityTokenReference.getTokenElement(org.w3c.dom.Document doc,
WSDocInfo docInfo,
javax.security.auth.callback.CallbackHandler cb)
Gets the signing token element, which may be a BinarySecurityToken
or a SAML token. |
java.security.cert.X509Certificate |
X509Security.getX509Certificate(Crypto crypto)
Gets the X509Certificate certificate. |
java.security.cert.X509Certificate[] |
PKIPathSecurity.getX509Certificates(Crypto crypto)
get the X509Certificate array. |
java.security.cert.X509Certificate[] |
SecurityTokenReference.getX509IssuerSerial(Crypto crypto)
Gets the certificate identified with X509 issuerSerial data. |
java.security.cert.X509Certificate |
SecurityTokenReference.getX509SKIAlias(Crypto crypto)
|
boolean |
UsernameToken.isDerivedKey()
Return whether the UsernameToken represented by this class is to be used for key derivation as per the UsernameToken Profile 1.1. |
void |
KerberosSecurity.retrieveServiceTicket(java.lang.String jaasLoginModuleName,
javax.security.auth.callback.CallbackHandler callbackHandler,
java.lang.String serviceName)
Retrieve a service ticket from a KDC using the Kerberos JAAS module, and set it in this BinarySecurityToken. |
void |
SecurityTokenReference.setKeyIdentifier(java.lang.String valueType,
java.lang.String keyIdVal)
|
void |
SecurityTokenReference.setKeyIdentifier(java.lang.String valueType,
java.lang.String keyIdVal,
boolean base64)
|
void |
SecurityTokenReference.setKeyIdentifier(java.security.cert.X509Certificate cert)
Sets the KeyIdentifier Element as a X509 certificate. |
void |
SecurityTokenReference.setKeyIdentifierEncKeySHA1(java.lang.String value)
|
void |
SecurityTokenReference.setKeyIdentifierSKI(java.security.cert.X509Certificate cert,
Crypto crypto)
Sets the KeyIdentifier Element as a X509 Subject-Key-Identifier (SKI). |
void |
SecurityTokenReference.setKeyIdentifierThumb(java.security.cert.X509Certificate cert)
Sets the KeyIdentifier Element as a Thumbprint. |
void |
UsernameToken.setRawPassword(RequestData data)
Set the raw (plain text) password used to compute secret key. |
void |
X509Security.setX509Certificate(java.security.cert.X509Certificate cert)
Sets the X509Certificate. |
void |
PKIPathSecurity.setX509Certificates(java.security.cert.X509Certificate[] certs,
Crypto crypto)
set the X509Certificate array. |
Constructors in org.apache.ws.security.message.token that throw WSSecurityException | |
---|---|
BinarySecurity(javax.security.auth.callback.CallbackHandler callbackHandler)
Create a BinarySecurityToken via a CallbackHandler |
|
BinarySecurity(org.w3c.dom.Element elem)
Constructor. |
|
BinarySecurity(org.w3c.dom.Element elem,
boolean bspCompliant)
Constructor. |
|
DerivedKeyToken(org.w3c.dom.Element elem)
This will create a DerivedKeyToken object with the given DerivedKeyToken element |
|
DerivedKeyToken(org.w3c.dom.Element elem,
boolean bspCompliant)
This will create a DerivedKeyToken object with the given DerivedKeyToken element |
|
DOMX509Data(org.w3c.dom.Element x509DataElement)
Constructor. |
|
KerberosSecurity(org.w3c.dom.Element elem)
This constructor creates a new Kerberos token object and initializes it from the data contained in the element. |
|
KerberosSecurity(org.w3c.dom.Element elem,
boolean bspCompliant)
This constructor creates a new Kerberos token object and initializes it from the data contained in the element. |
|
PKIPathSecurity(org.w3c.dom.Element elem)
Constructor. |
|
PKIPathSecurity(org.w3c.dom.Element elem,
boolean bspCompliant)
Constructor. |
|
Reference(org.w3c.dom.Element elem)
Constructor. |
|
SecurityContextToken(org.w3c.dom.Element elem)
This is used to create a SecurityContextToken using a DOM Element |
|
SecurityTokenReference(org.w3c.dom.Element elem)
Constructor. |
|
SecurityTokenReference(org.w3c.dom.Element elem,
boolean bspCompliant)
Constructor. |
|
SignatureConfirmation(org.w3c.dom.Element elem)
Constructs a SignatureConfirmation object and parses the
wsse11:SignatureConfirmation element to initialize it. |
|
Timestamp(org.w3c.dom.Element timestampElement)
Constructs a Timestamp object and parses the
wsu:Timestamp element to initialize it. |
|
Timestamp(org.w3c.dom.Element timestampElement,
boolean bspCompliant)
Constructs a Timestamp object and parses the
wsu:Timestamp element to initialize it. |
|
UsernameToken(org.w3c.dom.Element elem)
Constructs a UsernameToken object and parses the
wsse:UsernameToken element to initialize it. |
|
UsernameToken(org.w3c.dom.Element elem,
boolean allowNamespaceQualifiedPasswordTypes,
boolean bspCompliant)
Constructs a UsernameToken object and parses the
wsse:UsernameToken element to initialize it. |
|
X509Security(org.w3c.dom.Element elem)
This constructor creates a new X509 certificate object and initializes it from the data contained in the element. |
|
X509Security(org.w3c.dom.Element elem,
boolean bspCompliant)
This constructor creates a new X509 certificate object and initializes it from the data contained in the element. |
Uses of WSSecurityException in org.apache.ws.security.processor |
---|
Methods in org.apache.ws.security.processor that throw WSSecurityException | |
---|---|
static WSDataRef |
ReferenceListProcessor.decryptEncryptedData(org.w3c.dom.Document doc,
java.lang.String dataRefURI,
org.w3c.dom.Element encData,
javax.crypto.SecretKey symmetricKey,
java.lang.String symEncAlgo)
Decrypt the EncryptedData argument using a SecretKey. |
static org.w3c.dom.Element |
ReferenceListProcessor.findEncryptedDataElement(org.w3c.dom.Document doc,
WSDocInfo wsDocInfo,
java.lang.String dataRefURI)
Look up the encrypted data. |
static java.lang.String |
X509Util.getEncAlgo(org.w3c.dom.Node encBodyData)
|
protected static javax.crypto.SecretKey |
X509Util.getSharedKey(org.w3c.dom.Element keyInfoElem,
java.lang.String algorithm,
javax.security.auth.callback.CallbackHandler cb)
|
Credential |
SAMLTokenProcessor.handleSAMLToken(org.w3c.dom.Element token,
RequestData data,
Validator validator,
WSDocInfo docInfo)
|
java.util.List<WSSecurityEngineResult> |
TimestampProcessor.handleToken(org.w3c.dom.Element elem,
RequestData data,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
SignatureConfirmationProcessor.handleToken(org.w3c.dom.Element elem,
RequestData data,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
SecurityContextTokenProcessor.handleToken(org.w3c.dom.Element elem,
RequestData data,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
Processor.handleToken(org.w3c.dom.Element elem,
RequestData request,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
BinarySecurityTokenProcessor.handleToken(org.w3c.dom.Element elem,
RequestData data,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
DerivedKeyTokenProcessor.handleToken(org.w3c.dom.Element elem,
RequestData data,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
EncryptedDataProcessor.handleToken(org.w3c.dom.Element elem,
RequestData request,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
EncryptedKeyProcessor.handleToken(org.w3c.dom.Element elem,
RequestData data,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
UsernameTokenProcessor.handleToken(org.w3c.dom.Element elem,
RequestData data,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
ReferenceListProcessor.handleToken(org.w3c.dom.Element elem,
RequestData data,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
SAMLTokenProcessor.handleToken(org.w3c.dom.Element elem,
RequestData data,
WSDocInfo wsDocInfo)
|
java.util.List<WSSecurityEngineResult> |
SignatureProcessor.handleToken(org.w3c.dom.Element elem,
RequestData data,
WSDocInfo wsDocInfo)
|
Credential |
UsernameTokenProcessor.handleUsernameToken(org.w3c.dom.Element token,
Validator validator,
RequestData data)
Check the UsernameToken element and validate it. |
Uses of WSSecurityException in org.apache.ws.security.saml |
---|
Methods in org.apache.ws.security.saml that throw WSSecurityException | |
---|---|
org.w3c.dom.Document |
WSSecSignatureSAML.build(org.w3c.dom.Document doc,
Crypto uCrypto,
AssertionWrapper assertion,
Crypto iCrypto,
java.lang.String iKeyName,
java.lang.String iKeyPW,
WSSecHeader secHeader)
Builds a signed soap envelope with SAML token. |
void |
WSSecSignatureSAML.computeSignature(java.util.List<javax.xml.crypto.dsig.Reference> referenceList,
WSSecHeader secHeader,
org.w3c.dom.Element siblingElement)
Compute the Signature over the references. |
static AssertionWrapper |
SAMLUtil.getAssertionFromKeyIdentifier(SecurityTokenReference secRef,
org.w3c.dom.Element strElement,
RequestData request,
WSDocInfo wsDocInfo)
Get an AssertionWrapper object from parsing a SecurityTokenReference that uses a KeyIdentifier that points to a SAML Assertion. |
static SAMLKeyInfo |
SAMLUtil.getCredentialFromKeyInfo(org.w3c.dom.Element keyInfoElement,
RequestData data,
WSDocInfo docInfo,
boolean bspCompliant)
This method returns a SAMLKeyInfo corresponding to the credential found in the KeyInfo (DOM Element) argument. |
static SAMLKeyInfo |
SAMLUtil.getCredentialFromSubject(org.opensaml.saml1.core.Assertion assertion,
RequestData data,
WSDocInfo docInfo,
boolean bspCompliant)
Get the SAMLKeyInfo object corresponding to the credential stored in the Subject of a SAML 1.1 assertion |
static SAMLKeyInfo |
SAMLUtil.getCredentialFromSubject(org.opensaml.saml2.core.Assertion assertion,
RequestData data,
WSDocInfo docInfo,
boolean bspCompliant)
Get the SAMLKeyInfo object corresponding to the credential stored in the Subject of a SAML 2 assertion |
static SAMLKeyInfo |
SAMLUtil.getCredentialFromSubject(AssertionWrapper assertion,
RequestData data,
WSDocInfo docInfo,
boolean bspCompliant)
Parse a SAML Assertion to obtain a SAMLKeyInfo object from the Subject of the assertion |
static SAMLIssuer |
SAMLIssuerFactory.getInstance()
getInstance Returns an instance of SAMLIssuer. |
static SAMLIssuer |
SAMLIssuerFactory.getInstance(java.lang.Class<? extends SAMLIssuer> samlClass,
java.util.Properties properties)
getInstance Returns an instance of SAMLIssuer. |
static SAMLIssuer |
SAMLIssuerFactory.getInstance(java.lang.String propFilename)
getInstance Returns an instance of SAMLIssuer. |
AssertionWrapper |
SAMLIssuerImpl.newAssertion()
Creates a new AssertionWrapper. |
AssertionWrapper |
SAMLIssuer.newAssertion()
Creates a new AssertionWrapper . |
void |
WSSecSignatureSAML.prepare(org.w3c.dom.Document doc,
Crypto uCrypto,
AssertionWrapper assertion,
Crypto iCrypto,
java.lang.String iKeyName,
java.lang.String iKeyPW,
WSSecHeader secHeader)
Initialize a WSSec SAML Signature. |
Constructors in org.apache.ws.security.saml that throw WSSecurityException | |
---|---|
SAMLIssuerImpl(java.util.Properties prop)
|
Uses of WSSecurityException in org.apache.ws.security.saml.ext |
---|
Methods in org.apache.ws.security.saml.ext that throw WSSecurityException | |
---|---|
java.lang.String |
AssertionWrapper.assertionToString()
Method assertionToString ... |
static org.opensaml.xml.XMLObject |
OpenSAMLUtil.fromDom(org.w3c.dom.Element root)
Convert a SAML Assertion from a DOM Element to an XMLObject |
byte[] |
AssertionWrapper.getSignatureValue()
Get the SignatureValue bytes of the signed SAML Assertion |
void |
AssertionWrapper.parseHOKSubject(RequestData data,
WSDocInfo docInfo)
This method parses the KeyInfo of the Subject for the holder-of-key confirmation method, as required by the SAML Token spec. |
void |
AssertionWrapper.signAssertion(java.lang.String issuerKeyName,
java.lang.String issuerKeyPassword,
Crypto issuerCrypto,
boolean sendKeyValue)
Create an enveloped signature on the assertion that has been created. |
org.w3c.dom.Element |
AssertionWrapper.toDOM(org.w3c.dom.Document doc)
Create a DOM from the current XMLObject content. |
static org.w3c.dom.Element |
OpenSAMLUtil.toDom(org.opensaml.xml.XMLObject xmlObject,
org.w3c.dom.Document doc)
Convert a SAML Assertion from a XMLObject to a DOM Element |
void |
AssertionWrapper.verifySignature(RequestData data,
WSDocInfo docInfo)
Verify the signature of this assertion |
Constructors in org.apache.ws.security.saml.ext that throw WSSecurityException | |
---|---|
AssertionWrapper(org.w3c.dom.Element element)
Constructor AssertionWrapper creates a new AssertionWrapper instance. |
|
AssertionWrapper(SAMLParms parms)
Constructor AssertionWrapper creates a new AssertionWrapper instance. |
Uses of WSSecurityException in org.apache.ws.security.saml.ext.builder |
---|
Methods in org.apache.ws.security.saml.ext.builder that throw WSSecurityException | |
---|---|
static org.opensaml.xml.signature.KeyInfo |
SAML1ComponentBuilder.createKeyInfo(KeyInfoBean keyInfo)
Create an Opensaml KeyInfo object from the parameters |
static org.opensaml.saml1.core.Subject |
SAML1ComponentBuilder.createSaml1v1Subject(SubjectBean subjectBean)
Create a SAML Subject from a SubjectBean instance |
static org.opensaml.saml2.core.Subject |
SAML2ComponentBuilder.createSaml2Subject(SubjectBean subjectBean)
Create a Subject. |
static java.util.List<org.opensaml.saml1.core.AttributeStatement> |
SAML1ComponentBuilder.createSamlv1AttributeStatement(java.util.List<AttributeStatementBean> attributeData)
Create SAML 1.1 attribute statement(s) |
static java.util.List<org.opensaml.saml1.core.AuthenticationStatement> |
SAML1ComponentBuilder.createSamlv1AuthenticationStatement(java.util.List<AuthenticationStatementBean> authBeans)
Create SAML 1.1 authentication statement(s) |
static java.util.List<org.opensaml.saml1.core.AuthorizationDecisionStatement> |
SAML1ComponentBuilder.createSamlv1AuthorizationDecisionStatement(java.util.List<AuthDecisionStatementBean> decisionData)
Create SAML 1.1 Authorization Decision Statement(s) |
static org.opensaml.saml2.core.SubjectConfirmationData |
SAML2ComponentBuilder.createSubjectConfirmationData(java.lang.String inResponseTo,
java.lang.String recipient,
org.joda.time.DateTime notOnOrAfter,
KeyInfoBean keyInfoBean)
Create a SubjectConfirmationData object |
Uses of WSSecurityException in org.apache.ws.security.str |
---|
Methods in org.apache.ws.security.str that throw WSSecurityException | |
---|---|
static void |
BSPEnforcer.checkBinarySecurityBSPCompliance(SecurityTokenReference secRef,
BinarySecurity token)
Check that the BinarySecurityToken referenced by the SecurityTokenReference argument is BSP compliant. |
static void |
BSPEnforcer.checkEncryptedKeyBSPCompliance(SecurityTokenReference secRef)
Check that the EncryptedKey referenced by the SecurityTokenReference argument is BSP compliant. |
static void |
BSPEnforcer.checkSamlTokenBSPCompliance(SecurityTokenReference secRef,
AssertionWrapper assertion)
Check that the SAML token referenced by the SecurityTokenReference argument is BSP compliant. |
static void |
BSPEnforcer.checkUsernameTokenBSPCompliance(SecurityTokenReference secRef)
Check that the Username token referenced by the SecurityTokenReference argument is BSP compliant. |
void |
DerivedKeyTokenSTRParser.parseSecurityTokenReference(org.w3c.dom.Element strElement,
RequestData data,
WSDocInfo wsDocInfo,
java.util.Map<java.lang.String,java.lang.Object> parameters)
Parse a SecurityTokenReference element and extract credentials. |
void |
SignatureSTRParser.parseSecurityTokenReference(org.w3c.dom.Element strElement,
RequestData data,
WSDocInfo wsDocInfo,
java.util.Map<java.lang.String,java.lang.Object> parameters)
Parse a SecurityTokenReference element and extract credentials. |
void |
SecurityTokenRefSTRParser.parseSecurityTokenReference(org.w3c.dom.Element strElement,
RequestData data,
WSDocInfo wsDocInfo,
java.util.Map<java.lang.String,java.lang.Object> parameters)
Parse a SecurityTokenReference element and extract credentials. |
void |
STRParser.parseSecurityTokenReference(org.w3c.dom.Element strElement,
RequestData data,
WSDocInfo wsDocInfo,
java.util.Map<java.lang.String,java.lang.Object> parameters)
Parse a SecurityTokenReference element and extract credentials. |
void |
EncryptedKeySTRParser.parseSecurityTokenReference(org.w3c.dom.Element strElement,
RequestData data,
WSDocInfo wsDocInfo,
java.util.Map<java.lang.String,java.lang.Object> parameters)
Parse a SecurityTokenReference element and extract credentials. |
Uses of WSSecurityException in org.apache.ws.security.transform |
---|
Methods in org.apache.ws.security.transform that throw WSSecurityException | |
---|---|
static org.w3c.dom.Element |
STRTransformUtil.createBSTX509(org.w3c.dom.Document doc,
java.security.cert.X509Certificate cert,
org.w3c.dom.Element secRefE)
|
static org.w3c.dom.Element |
STRTransformUtil.dereferenceSTR(org.w3c.dom.Document doc,
SecurityTokenReference secRef,
WSDocInfo wsDocInfo)
Retrieves the element representing the referenced content of a STR. |
Uses of WSSecurityException in org.apache.ws.security.util |
---|
Methods in org.apache.ws.security.util that throw WSSecurityException | |
---|---|
static void |
WSSecurityUtil.checkAllElementsProtected(java.util.List<WSSecurityEngineResult> results,
int action,
javax.xml.namespace.QName[] requiredParts)
Check that all of the QName[] requiredParts are protected by a specified action in the results list. |
static void |
WSSecurityUtil.checkSignsAllElements(WSSecurityEngineResult resultItem,
java.lang.String[] requiredIDs)
Ensure that this covers all required elements (identified by their wsu:Id attributes). |
static byte[] |
Base64.decode(java.lang.String encoded)
Decodes Base64 data into octets |
static int |
WSSecurityUtil.decodeAction(java.lang.String action,
java.util.List<java.lang.Integer> actions)
|
static int |
WSSecurityUtil.decodeAction(java.lang.String action,
java.util.List<java.lang.Integer> actions,
WSSConfig wssConfig)
Decode an action String. |
static java.util.List<org.w3c.dom.Element> |
WSSecurityUtil.findElements(WSEncryptionPart part,
CallbackLookup callbackLookup,
org.w3c.dom.Document doc)
Find the DOM Element in the SOAP Envelope that is referenced by the WSEncryptionPart argument. |
static org.w3c.dom.Element |
WSSecurityUtil.findWsseSecurityHeaderBlock(org.w3c.dom.Document doc,
org.w3c.dom.Element envelope,
boolean doCreate)
find the first ws-security header block |
static org.w3c.dom.Element |
WSSecurityUtil.findWsseSecurityHeaderBlock(org.w3c.dom.Document doc,
org.w3c.dom.Element envelope,
java.lang.String actor,
boolean doCreate)
find a WS-Security header block for a given actor |
static byte[] |
WSSecurityUtil.generateDigest(byte[] inputBytes)
Generate a (SHA1) digest of the input bytes. |
static byte[] |
WSSecurityUtil.generateNonce(int length)
Generate a nonce of the given length using the SHA1PRNG algorithm. |
static javax.crypto.Cipher |
WSSecurityUtil.getCipherInstance(java.lang.String cipherAlgo)
Translate the "cipherAlgo" URI to a JCE ID, and return a javax.crypto.Cipher instance of this type. |
static int |
WSSecurityUtil.getKeyLength(java.lang.String algorithm)
Returns the length of the key in # of bytes |
static org.w3c.dom.Element |
WSSecurityUtil.getSecurityHeader(org.w3c.dom.Document doc,
java.lang.String actor)
Returns the first WS-Security header element for a given actor. |
Uses of WSSecurityException in org.apache.ws.security.validate |
---|
Methods in org.apache.ws.security.validate that throw WSSecurityException | |
---|---|
protected boolean |
SignatureTrustValidator.isCertificateInKeyStore(Crypto crypto,
java.security.cert.X509Certificate cert)
Check to see if the certificate argument is in the keystore |
Credential |
Validator.validate(Credential credential,
RequestData data)
Validate the credential argument. |
Credential |
UsernameTokenValidator.validate(Credential credential,
RequestData data)
Validate the credential argument. |
Credential |
TimestampValidator.validate(Credential credential,
RequestData data)
Validate the credential argument. |
Credential |
SignatureTrustValidator.validate(Credential credential,
RequestData data)
Validate the credential argument. |
Credential |
NoOpValidator.validate(Credential credential,
RequestData data)
Validate the credential argument. |
Credential |
SamlAssertionValidator.validate(Credential credential,
RequestData data)
Validate the credential argument. |
Credential |
KerberosTokenValidator.validate(Credential credential,
RequestData data)
Validate the credential argument. |
protected void |
SignatureTrustValidator.validateCertificates(java.security.cert.X509Certificate[] certificates)
Validate the certificates by checking the validity of each cert |
protected boolean |
SignatureTrustValidator.validatePublicKey(java.security.PublicKey publicKey,
Crypto crypto)
Validate a public key |
protected void |
UsernameTokenValidator.verifyCustomPassword(UsernameToken usernameToken,
RequestData data)
Verify a UsernameToken containing a password of some unknown (but specified) password type. |
protected void |
UsernameTokenValidator.verifyDigestPassword(UsernameToken usernameToken,
RequestData data)
Verify a UsernameToken containing a password digest. |
protected void |
UsernameTokenValidator.verifyPlaintextPassword(UsernameToken usernameToken,
RequestData data)
Verify a UsernameToken containing a plaintext password. |
protected Credential |
SamlAssertionValidator.verifySignedAssertion(AssertionWrapper assertion,
RequestData data)
Verify trust in the signature of a signed Assertion. |
protected boolean |
SignatureTrustValidator.verifyTrustInCert(java.security.cert.X509Certificate cert,
Crypto crypto)
Deprecated. |
protected boolean |
SignatureTrustValidator.verifyTrustInCert(java.security.cert.X509Certificate cert,
Crypto crypto,
boolean enableRevocation)
Evaluate whether a given certificate should be trusted. |
protected boolean |
SignatureTrustValidator.verifyTrustInCerts(java.security.cert.X509Certificate[] certificates,
Crypto crypto)
Deprecated. |
protected boolean |
SignatureTrustValidator.verifyTrustInCerts(java.security.cert.X509Certificate[] certificates,
Crypto crypto,
boolean enableRevocation)
Evaluate whether the given certificate chain should be trusted. |
protected void |
UsernameTokenValidator.verifyUnknownPassword(UsernameToken usernameToken,
RequestData data)
Verify a UsernameToken containing no password. |
|
||||||||||
PREV NEXT | FRAMES NO FRAMES |