WSSecUsernameToken builder = new WSSecUsernameToken(); builder.setWsConfig(reqData.getWssConfig()); builder.setPasswordType(reqData.getPwType()); builder.setUserInfo(username, password); reqData.getUtElements()[j].trim(); if (reqData.getUtElements()[j].equals("Nonce")) { builder.addNonce(); builder.addCreated(); builder.build(doc, reqData.getSecHeader());
/** * Adds a new <code>UsernameToken</code> to a soap envelope. * * Before calling <code>build()</code> all parameters such as user, * password, passwordType etc. must be set. A complete * <code>UsernameToken</code> is constructed and added to the * <code>wsse:Security</code> header. * * @param doc The SOAP envelope as W3C document * @param secHeader The security header inside the SOAP envelope * @return Document with UsernameToken added */ public Document build(Document doc, WSSecHeader secHeader) { log.debug("Begin add username token..."); prepare(doc); prependToHeader(secHeader); return doc; }
handler.getPasswordCB(reqData.getUsername(), actionToDo, callbackHandler, reqData); WSSecUsernameToken builder = new WSSecUsernameToken(reqData.getWssConfig()); builder.addDerivedKey(useMac, null, iterations); } else { builder.setPasswordType(reqData.getPwType()); // enhancement by Alberto Coletti builder.setSecretKeyLength(reqData.getSecretKeyLength()); builder.setUserInfo(reqData.getUsername(), passwordCallback.getPassword()); builder.addCreated(); builder.addNonce(); builder.prepare(doc); sign.setCustomTokenId(builder.getId()); sign.setSecretKey(builder.getSecretKey()); sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); if (reqData.getSigDigestAlgorithm() != null) { ); builder.prependToHeader(reqData.getSecHeader());
WSSecUsernameToken builder = new WSSecUsernameToken(reqData.getWssConfig()); builder.setPasswordType(reqData.getPwType()); builder.setPasswordsAreEncoded(reqData.getWssConfig().getPasswordsAreEncoded()); builder.setUserInfo(username, password); String utElement = reqData.getUtElements()[j].trim(); if (utElement.equals("Nonce")) { builder.addNonce(); builder.addCreated(); builder.build(doc, reqData.getSecHeader());
secHeader.insertSecurityHeader(doc); WSSecUsernameToken utBuilder = new WSSecUsernameToken(); utBuilder.setPasswordType(WSConstants.PASSWORD_TEXT); utBuilder.setUserInfo(username, password); utBuilder.build(doc, secHeader);
WSSecUsernameToken utBuilder = new WSSecUsernameToken(); utBuilder.setUserInfo(user, null); utBuilder.setPasswordType(null); if (rmd.getConfig() != null) { utBuilder.setWsConfig(rmd.getConfig()); WSSecUsernameToken utBuilder = new WSSecUsernameToken(); if(rmd.getConfig() != null) { utBuilder.setWsConfig(rmd.getConfig()); utBuilder.setPasswordType(WSConstants.PASSWORD_DIGEST); } else { utBuilder.setPasswordType(WSConstants.PASSWORD_TEXT); utBuilder.setUserInfo(user, password);
WSSecUsernameToken utBuilder = addUsernameToken(rmd, (UsernameToken) token); utBuilder.prepare(rmd.getDocument()); Element elem = utBuilder.getUsernameTokenElement(); elem = RampartUtil.insertSiblingAfter(rmd, this.getInsertionLocation(), elem); encryptedTokensIdList.add(utBuilder.getId()); try { org.apache.rahas.Token tempTok = new org.apache.rahas.Token( utBuilder.getId(), (OMElement) elem, now, new Date(now.getTime() + 300000)); endSuppTokMap.put(token, tempTok);
WSSecUsernameToken utBuilder = addUsernameToken(rmd, (UsernameToken) token); utBuilder.prepare(rmd.getDocument()); utBuilder.appendToHeader(rmd.getSecHeader());
handler.getPasswordCB(reqData.getUsername(), actionToDo, callbackHandler, reqData); WSSecUsernameToken builder = new WSSecUsernameToken(reqData.getWssConfig()); builder.addDerivedKey(useMac, null, iterations); } else { builder.setPasswordType(reqData.getPwType()); // enhancement by Alberto Coletti builder.setSecretKeyLength(reqData.getSecretKeyLength()); builder.setUserInfo(reqData.getUsername(), passwordCallback.getPassword()); builder.addCreated(); builder.addNonce(); builder.prepare(doc); sign.setCustomTokenId(builder.getId()); sign.setSecretKey(builder.getSecretKey()); sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); if (reqData.getSigDigestAlgorithm() != null) { ); builder.prependToHeader(reqData.getSecHeader());
WSSecUsernameToken builder = new WSSecUsernameToken(reqData.getWssConfig()); builder.setPasswordType(reqData.getPwType()); builder.setPasswordsAreEncoded(reqData.getWssConfig().getPasswordsAreEncoded()); builder.setUserInfo(username, password); String utElement = reqData.getUtElements()[j].trim(); if (utElement.equals("Nonce")) { builder.addNonce(); builder.addCreated(); builder.build(doc, reqData.getSecHeader());
secHeader.insertSecurityHeader(doc); WSSecUsernameToken utBuilder = new WSSecUsernameToken(); utBuilder.setPasswordType(WSConstants.PASSWORD_TEXT); utBuilder.setUserInfo(username, password); utBuilder.build(doc, secHeader);
secHeader.insertSecurityHeader(doc); WSSecUsernameToken utBuilder = new WSSecUsernameToken(); utBuilder.setPasswordType(WSConstants.PASSWORD_TEXT); utBuilder.setUserInfo(username, password); utBuilder.build(doc, secHeader);
/** * Adds a new <code>UsernameToken</code> to a soap envelope. * * Before calling <code>build()</code> all parameters such as user, * password, passwordType etc. must be set. A complete * <code>UsernameToken</code> is constructed and added to the * <code>wsse:Security</code> header. * * @param doc The SOAP envelope as W3C document * @param secHeader The security header inside the SOAP envelope * @return Document with UsernameToken added */ public Document build(Document doc, WSSecHeader secHeader) { log.debug("Begin add username token..."); prepare(doc); prependToHeader(secHeader); return doc; }