Package org.apache.ws.security.components.crypto

Examples of org.apache.ws.security.components.crypto.AlgorithmSuite


        // Deserialize the DKT
        dkt = new DerivedKeyToken(elem);
       
        // Check for compliance against the defined AlgorithmSuite
        if (requestData != null) {
            AlgorithmSuite algorithmSuite = requestData.getAlgorithmSuite();
            if (algorithmSuite != null) {
                AlgorithmSuiteValidator algorithmSuiteValidator = new AlgorithmSuiteValidator(algorithmSuite);
                algorithmSuiteValidator.checkDerivedKeyAlgorithm(dkt.getAlgorithm());
            }
        }
View Full Code Here


        String encAlgo = X509Util.getEncAlgo(elem);
        SecretKey key = WSSecurityUtil.prepareSecretKey(encAlgo, symmKey);
       
        // Check for compliance against the defined AlgorithmSuite
        if (requestData != null) {
            AlgorithmSuite algorithmSuite = requestData.getAlgorithmSuite();
            if (algorithmSuite != null) {
                AlgorithmSuiteValidator algorithmSuiteValidator = new AlgorithmSuiteValidator(algorithmSuite);
   
                algorithmSuiteValidator.checkSymmetricKeyLength(key.getEncoded().length);
                algorithmSuiteValidator.checkSymmetricEncryptionAlgorithm(encAlgo);
View Full Code Here

                throw new WSSecurityException(WSSecurityException.FAILED_CHECK, null, null, e);
            }
        }

        // Check for compliance against the defined AlgorithmSuite
        AlgorithmSuite algorithmSuite = requestData != null ? requestData.getAlgorithmSuite() : null;
        if (algorithmSuite != null) {
            AlgorithmSuiteValidator algorithmSuiteValidator = new AlgorithmSuiteValidator(algorithmSuite);

            algorithmSuiteValidator.checkAsymmetricKeyLength(cert);
            algorithmSuiteValidator.checkEncryptionKeyWrapAlgorithm(encryptedKeyTransportMethod);
View Full Code Here

     */
    protected void setAlgorithmSuites(SoapMessage message, RequestData data) throws WSSecurityException {
        Binding binding = getBinding(message);
        if (binding != null && binding.getAlgorithmSuite() != null) {
            // Translate into WSS4J's AlgorithmSuite class
            AlgorithmSuite algorithmSuite = translateAlgorithmSuite(binding.getAlgorithmSuite());
            data.setAlgorithmSuite(algorithmSuite);
        }

        // Now look for an AlgorithmSuite for a SAML Assertion
        AssertionInfoMap aim = message.get(AssertionInfoMap.class);
        if (aim != null) {
            Collection<AssertionInfo> ais = aim.get(SP12Constants.SAML_TOKEN);
            if (ais != null && !ais.isEmpty()) {
                for (AssertionInfo ai : ais) {
                    SamlToken samlToken = (SamlToken)ai.getAssertion();
                    SupportingToken supportingToken = samlToken.getSupportingToken();
                    if (supportingToken != null && supportingToken.getAlgorithmSuite() != null) {
                        AlgorithmSuite algorithmSuite =
                            translateAlgorithmSuite(supportingToken.getAlgorithmSuite());
                        data.setSamlAlgorithmSuite(algorithmSuite);
                        break;
                    }
                }
View Full Code Here

     */
    private AlgorithmSuite translateAlgorithmSuite(
        org.apache.cxf.ws.security.policy.model.AlgorithmSuite cxfAlgorithmSuite
    ) {
        // Translate into WSS4J's AlgorithmSuite class
        AlgorithmSuite algorithmSuite = new AlgorithmSuite();
        algorithmSuite.setEncryptionDerivedKeyLength(
            cxfAlgorithmSuite.getEncryptionDerivedKeyLength());
        algorithmSuite.setSignatureDerivedKeyLength(
            cxfAlgorithmSuite.getSignatureDerivedKeyLength());
        algorithmSuite.setMaximumAsymmetricKeyLength(
            cxfAlgorithmSuite.getMaximumAsymmetricKeyLength());
        algorithmSuite.setMinimumAsymmetricKeyLength(
            cxfAlgorithmSuite.getMinimumAsymmetricKeyLength());
        algorithmSuite.setMaximumSymmetricKeyLength(
            cxfAlgorithmSuite.getMaximumSymmetricKeyLength());
        algorithmSuite.setMinimumSymmetricKeyLength(
            cxfAlgorithmSuite.getMinimumSymmetricKeyLength());

        algorithmSuite.addEncryptionMethod(cxfAlgorithmSuite.getEncryption());
        algorithmSuite.addKeyWrapAlgorithm(cxfAlgorithmSuite.getSymmetricKeyWrap());
        algorithmSuite.addKeyWrapAlgorithm(cxfAlgorithmSuite.getAsymmetricKeyWrap());

        algorithmSuite.addSignatureMethod(cxfAlgorithmSuite.getAsymmetricSignature());
        algorithmSuite.addSignatureMethod(cxfAlgorithmSuite.getSymmetricSignature());
        algorithmSuite.addDigestAlgorithm(cxfAlgorithmSuite.getDigest());
        algorithmSuite.addC14nAlgorithm(cxfAlgorithmSuite.getInclusiveC14n());

        algorithmSuite.addTransformAlgorithm(cxfAlgorithmSuite.getInclusiveC14n());
        algorithmSuite.addTransformAlgorithm(SPConstants.STRT10);
        algorithmSuite.addTransformAlgorithm(WSConstants.NS_XMLDSIG_ENVELOPED_SIGNATURE);

        algorithmSuite.addDerivedKeyAlgorithm(SPConstants.P_SHA1);
        algorithmSuite.addDerivedKeyAlgorithm(SPConstants.P_SHA1_L128);

        return algorithmSuite;
    }
View Full Code Here

            && publicKey == null) {
            throw new WSSecurityException(WSSecurityException.FAILED_CHECK);
        }
       
        // Check for compliance against the defined AlgorithmSuite
        AlgorithmSuite algorithmSuite = data.getAlgorithmSuite();
        if (algorithmSuite != null) {
            AlgorithmSuiteValidator algorithmSuiteValidator = new
                AlgorithmSuiteValidator(algorithmSuite);

            if (principal instanceof WSDerivedKeyTokenPrincipal) {
View Full Code Here

            if (data.getWssConfig().isWsiBSPCompliant()) {
                checkBSPCompliance(xmlSignature);
            }
           
            // Check for compliance against the defined AlgorithmSuite
            AlgorithmSuite algorithmSuite = data.getAlgorithmSuite();
            if (algorithmSuite != null) {
                AlgorithmSuiteValidator algorithmSuiteValidator = new
                    AlgorithmSuiteValidator(algorithmSuite);
                algorithmSuiteValidator.checkSignatureAlgorithms(xmlSignature);
            }
View Full Code Here

                WSSecurityException.UNSUPPORTED_ALGORITHM, "noEncKey"
            );
        }
       
        // Check for compliance against the defined AlgorithmSuite
        AlgorithmSuite algorithmSuite = request.getAlgorithmSuite();
        if (algorithmSuite != null) {
            AlgorithmSuiteValidator algorithmSuiteValidator = new
                AlgorithmSuiteValidator(algorithmSuite);

            if (principal instanceof WSDerivedKeyTokenPrincipal) {
View Full Code Here

        Object mc = reqData.getMsgContext();
        if (mc == null || reqData.getAlgorithmSuite() != null) {
            return;
        }
       
        AlgorithmSuite algorithmSuite = new AlgorithmSuite();
       
        String signatureAlgorithm = getString(WSHandlerConstants.SIG_ALGO, mc);
        if (signatureAlgorithm != null && !"".equals(signatureAlgorithm)) {
            algorithmSuite.addSignatureMethod(signatureAlgorithm);
        }
        String signatureDigestAlgorithm = getString(WSHandlerConstants.SIG_DIGEST_ALGO, mc);
        if (signatureDigestAlgorithm != null && !"".equals(signatureDigestAlgorithm)) {
            algorithmSuite.addDigestAlgorithm(signatureDigestAlgorithm);
        }
       
        String encrAlgorithm = getString(WSHandlerConstants.ENC_SYM_ALGO, mc);
        if (encrAlgorithm != null && !"".equals(encrAlgorithm)) {
            algorithmSuite.addEncryptionMethod(encrAlgorithm);
        }
        String transportAlgorithm = getString(WSHandlerConstants.ENC_KEY_TRANSPORT, mc);
        if (transportAlgorithm != null && !"".equals(transportAlgorithm)) {
            algorithmSuite.addKeyWrapAlgorithm(transportAlgorithm);
        }
       
        reqData.setAlgorithmSuite(algorithmSuite);
    }
View Full Code Here

                new Object[]{symEncAlgo}, ex
            );
        }
       
        // Check for compliance against the defined AlgorithmSuite
        AlgorithmSuite algorithmSuite = data.getAlgorithmSuite();
        if (algorithmSuite != null) {
            AlgorithmSuiteValidator algorithmSuiteValidator = new
                AlgorithmSuiteValidator(algorithmSuite);

            algorithmSuiteValidator.checkSymmetricKeyLength(symmetricKey.getEncoded().length);
View Full Code Here

TOP

Related Classes of org.apache.ws.security.components.crypto.AlgorithmSuite

Copyright © 2018 www.massapicom. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.