Return-Path: X-Original-To: apmail-cxf-commits-archive@www.apache.org Delivered-To: apmail-cxf-commits-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id D01BA18195 for ; Mon, 14 Mar 2016 16:40:52 +0000 (UTC) Received: (qmail 78650 invoked by uid 500); 14 Mar 2016 16:40:52 -0000 Delivered-To: apmail-cxf-commits-archive@cxf.apache.org Received: (qmail 78433 invoked by uid 500); 14 Mar 2016 16:40:52 -0000 Mailing-List: contact commits-help@cxf.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cxf.apache.org Delivered-To: mailing list commits@cxf.apache.org Received: (qmail 78335 invoked by uid 99); 14 Mar 2016 16:40:52 -0000 Received: from git1-us-west.apache.org (HELO git1-us-west.apache.org) (140.211.11.23) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 14 Mar 2016 16:40:52 +0000 Received: by git1-us-west.apache.org (ASF Mail Server at git1-us-west.apache.org, from userid 33) id 4E922DFC55; Mon, 14 Mar 2016 16:40:52 +0000 (UTC) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: coheigea@apache.org To: commits@cxf.apache.org Date: Mon, 14 Mar 2016 16:40:54 -0000 Message-Id: <1357c694858a4ca4ada40291f586e8f6@git.apache.org> In-Reply-To: <3fbb7c2e1ce245e095864ba19abcda75@git.apache.org> References: <3fbb7c2e1ce245e095864ba19abcda75@git.apache.org> X-Mailer: ASF-Git Admin Mailer Subject: [3/6] cxf git commit: WSS4J updates WSS4J updates Project: http://git-wip-us.apache.org/repos/asf/cxf/repo Commit: http://git-wip-us.apache.org/repos/asf/cxf/commit/66bb668c Tree: http://git-wip-us.apache.org/repos/asf/cxf/tree/66bb668c Diff: http://git-wip-us.apache.org/repos/asf/cxf/diff/66bb668c Branch: refs/heads/3.1.x-fixes Commit: 66bb668ccf9f94bcf3ca4e51a0bbfa4342448e57 Parents: 83b0f6e Author: Colm O hEigeartaigh Authored: Fri Jan 15 11:08:22 2016 +0000 Committer: Colm O hEigeartaigh Committed: Mon Mar 14 14:28:21 2016 +0000 ---------------------------------------------------------------------- .../HttpsTokenInterceptorProvider.java | 12 +++---- .../security/trust/STSStaxTokenValidator.java | 10 +++--- .../PolicyBasedWSS4JStaxInInterceptor.java | 2 +- .../cxf/ws/security/wss4j/WSS4JUtils.java | 10 +++--- .../AbstractStaxBindingHandler.java | 16 ++++----- .../StaxAsymmetricBindingHandler.java | 4 +-- .../StaxSymmetricBindingHandler.java | 36 ++++++++++---------- .../ws/security/wss4j/StaxRoundTripTest.java | 2 +- .../StaxToDOMEncryptionIdentifierTest.java | 6 ++-- .../security/wss4j/StaxToDOMRoundTripTest.java | 2 +- .../wss4j/StaxToDOMSignatureIdentifierTest.java | 4 +-- .../security/wss4j/saml/StaxToDOMSamlTest.java | 8 ++--- 12 files changed, 56 insertions(+), 56 deletions(-) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/HttpsTokenInterceptorProvider.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/HttpsTokenInterceptorProvider.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/HttpsTokenInterceptorProvider.java index 12ff3ab..ebd0141 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/HttpsTokenInterceptorProvider.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/HttpsTokenInterceptorProvider.java @@ -260,7 +260,7 @@ public class HttpsTokenInterceptorProvider extends AbstractPolicyInterceptorProv ); HttpsSecurityTokenImpl httpsSecurityToken = new HttpsSecurityTokenImpl(true, policy.getUserName()); - httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TokenUsage_MainSignature); + httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TOKENUSAGE_MAIN_SIGNATURE); httpsTokenSecurityEvent.setSecurityToken(httpsSecurityToken); PolicyUtils.assertPolicy(aim, new QName(token.getName().getNamespaceURI(), @@ -278,7 +278,7 @@ public class HttpsTokenInterceptorProvider extends AbstractPolicyInterceptorProv ); HttpsSecurityTokenImpl httpsSecurityToken = new HttpsSecurityTokenImpl(false, policy.getUserName()); - httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TokenUsage_MainSignature); + httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TOKENUSAGE_MAIN_SIGNATURE); httpsTokenSecurityEvent.setSecurityToken(httpsSecurityToken); PolicyUtils.assertPolicy(aim, new QName(token.getName().getNamespaceURI(), @@ -306,14 +306,14 @@ public class HttpsTokenInterceptorProvider extends AbstractPolicyInterceptorProv ); HttpsSecurityTokenImpl httpsSecurityToken = new HttpsSecurityTokenImpl((X509Certificate)tlsInfo.getPeerCertificates()[0]); - httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TokenUsage_MainSignature); + httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TOKENUSAGE_MAIN_SIGNATURE); httpsTokenSecurityEvent.setSecurityToken(httpsSecurityToken); } else if (httpsTokenSecurityEvent.getAuthenticationType() == null) { httpsTokenSecurityEvent.setAuthenticationType( HttpsTokenSecurityEvent.AuthenticationType.HttpsNoAuthentication ); HttpsSecurityTokenImpl httpsSecurityToken = new HttpsSecurityTokenImpl(); - httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TokenUsage_MainSignature); + httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TOKENUSAGE_MAIN_SIGNATURE); httpsTokenSecurityEvent.setSecurityToken(httpsSecurityToken); } } else { @@ -339,14 +339,14 @@ public class HttpsTokenInterceptorProvider extends AbstractPolicyInterceptorProv ); HttpsSecurityTokenImpl httpsSecurityToken = new HttpsSecurityTokenImpl((X509Certificate)tlsInfo.getPeerCertificates()[0]); - httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TokenUsage_MainSignature); + httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TOKENUSAGE_MAIN_SIGNATURE); httpsTokenSecurityEvent.setSecurityToken(httpsSecurityToken); } else if (httpsTokenSecurityEvent.getAuthenticationType() == null) { httpsTokenSecurityEvent.setAuthenticationType( HttpsTokenSecurityEvent.AuthenticationType.HttpsNoAuthentication ); HttpsSecurityTokenImpl httpsSecurityToken = new HttpsSecurityTokenImpl(); - httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TokenUsage_MainSignature); + httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TOKENUSAGE_MAIN_SIGNATURE); httpsTokenSecurityEvent.setSecurityToken(httpsSecurityToken); } List securityEvents = getSecurityEventList(message); http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSStaxTokenValidator.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSStaxTokenValidator.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSStaxTokenValidator.java index b70fdcf..121789e 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSStaxTokenValidator.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/trust/STSStaxTokenValidator.java @@ -290,7 +290,7 @@ public class STSStaxTokenValidator usernameTokenPasswordType, username.getValue(), password, created, nonceVal, salt, iteration, tokenContext.getWsSecurityContext(), usernameTokenType.getId(), - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference); + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE); usernameSecurityToken.setElementPath(tokenContext.getElementPath()); usernameSecurityToken.setXMLSecEvent(tokenContext.getFirstXMLSecEvent()); @@ -463,7 +463,7 @@ public class STSStaxTokenValidator x509V3SecurityToken.setElementPath(tokenContext.getElementPath()); x509V3SecurityToken.setXMLSecEvent(tokenContext.getFirstXMLSecEvent()); return x509V3SecurityToken; - } else if (WSSConstants.NS_X509PKIPathv1.equals(binarySecurityTokenType.getValueType())) { + } else if (WSSConstants.NS_X509_PKIPATH_V1.equals(binarySecurityTokenType.getValueType())) { Crypto crypto = getCrypto(tokenContext.getWssSecurityProperties()); X509PKIPathv1SecurityTokenImpl x509PKIPathv1SecurityToken = new X509PKIPathv1SecurityTokenImpl( @@ -471,7 +471,7 @@ public class STSStaxTokenValidator crypto, tokenContext.getWssSecurityProperties().getCallbackHandler(), securityTokenData, binarySecurityTokenType.getId(), - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference, + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE, tokenContext.getWssSecurityProperties() ) { @Override @@ -499,7 +499,7 @@ public class STSStaxTokenValidator tokenContext.getWssSecurityProperties().getCallbackHandler(), securityTokenData, binarySecurityTokenType.getValueType(), binarySecurityTokenType.getId(), - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE ) { @Override public void verify() throws XMLSecurityException { @@ -538,7 +538,7 @@ public class STSStaxTokenValidator BinarySecurity binarySecurity = null; if (WSSConstants.NS_X509_V3_TYPE.equals(binarySecurityTokenType.getValueType())) { binarySecurity = new X509Security(doc); - } else if (WSSConstants.NS_X509PKIPathv1.equals(binarySecurityTokenType.getValueType())) { + } else if (WSSConstants.NS_X509_PKIPATH_V1.equals(binarySecurityTokenType.getValueType())) { binarySecurity = new PKIPathSecurity(doc); } else if (WSSConstants.NS_GSS_KERBEROS5_AP_REQ.equals(binarySecurityTokenType.getValueType())) { binarySecurity = new KerberosSecurity(doc); http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxInInterceptor.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxInInterceptor.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxInInterceptor.java index d6fcabe..7cdc486 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxInInterceptor.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/PolicyBasedWSS4JStaxInInterceptor.java @@ -138,7 +138,7 @@ public class PolicyBasedWSS4JStaxInInterceptor extends WSS4JStaxInInterceptor { ); HttpsSecurityTokenImpl httpsSecurityToken = new HttpsSecurityTokenImpl(); try { - httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TokenUsage_MainSignature); + httpsSecurityToken.addTokenUsage(WSSecurityTokenConstants.TOKENUSAGE_MAIN_SIGNATURE); } catch (XMLSecurityException e) { LOG.fine(e.getMessage()); } http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JUtils.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JUtils.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JUtils.java index f54680f..4869b10 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JUtils.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JUtils.java @@ -156,14 +156,14 @@ public final class WSS4JUtils { if (securityToken.getTokenType() != null) { if (securityToken.getTokenType() == WSSecurityTokenConstants.EncryptedKeyToken) { cachedTok.setTokenType(WSSConstants.NS_WSS_ENC_KEY_VALUE_TYPE); - } else if (securityToken.getTokenType() == WSSecurityTokenConstants.KerberosToken) { + } else if (securityToken.getTokenType() == WSSecurityTokenConstants.KERBEROS_TOKEN) { cachedTok.setTokenType(WSSConstants.NS_GSS_KERBEROS5_AP_REQ); - } else if (securityToken.getTokenType() == WSSecurityTokenConstants.Saml11Token) { + } else if (securityToken.getTokenType() == WSSecurityTokenConstants.SAML_11_TOKEN) { cachedTok.setTokenType(WSSConstants.NS_SAML11_TOKEN_PROFILE_TYPE); - } else if (securityToken.getTokenType() == WSSecurityTokenConstants.Saml20Token) { + } else if (securityToken.getTokenType() == WSSecurityTokenConstants.SAML_20_TOKEN) { cachedTok.setTokenType(WSSConstants.NS_SAML20_TOKEN_PROFILE_TYPE); - } else if (securityToken.getTokenType() == WSSecurityTokenConstants.SecureConversationToken - || securityToken.getTokenType() == WSSecurityTokenConstants.SecurityContextToken) { + } else if (securityToken.getTokenType() == WSSecurityTokenConstants.SECURE_CONVERSATION_TOKEN + || securityToken.getTokenType() == WSSecurityTokenConstants.SECURITY_CONTEXT_TOKEN) { cachedTok.setTokenType(WSSConstants.NS_WSC_05_02); } } http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractStaxBindingHandler.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractStaxBindingHandler.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractStaxBindingHandler.java index 4940b99..70d377f 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractStaxBindingHandler.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/AbstractStaxBindingHandler.java @@ -381,13 +381,13 @@ public abstract class AbstractStaxBindingHandler extends AbstractCommonBindingHa SecurityTokenConstants.TokenType tokenType = WSSecurityTokenConstants.EncryptedKeyToken; if (tok.getTokenType() != null) { if (tok.getTokenType().startsWith(WSSConstants.NS_KERBEROS11_TOKEN_PROFILE)) { - tokenType = WSSecurityTokenConstants.KerberosToken; + tokenType = WSSecurityTokenConstants.KERBEROS_TOKEN; } else if (tok.getTokenType().startsWith(WSSConstants.NS_SAML10_TOKEN_PROFILE) || tok.getTokenType().startsWith(WSSConstants.NS_SAML11_TOKEN_PROFILE)) { - tokenType = WSSecurityTokenConstants.Saml11Token; + tokenType = WSSecurityTokenConstants.SAML_11_TOKEN; } else if (tok.getTokenType().startsWith(WSSConstants.NS_WSC_05_02) || tok.getTokenType().startsWith(WSSConstants.NS_WSC_05_12)) { - tokenType = WSSecurityTokenConstants.SecureConversationToken; + tokenType = WSSecurityTokenConstants.SECURE_CONVERSATION_TOKEN; } } @@ -517,8 +517,8 @@ public abstract class AbstractStaxBindingHandler extends AbstractCommonBindingHa if (token instanceof X509Token && isTokenRequired(token.getIncludeTokenType()) && (WSSecurityTokenConstants.KeyIdentifier_IssuerSerial.equals(keyIdentifier) - || WSSecurityTokenConstants.KeyIdentifier_ThumbprintIdentifier.equals(keyIdentifier) - || WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference.equals( + || WSSecurityTokenConstants.KEYIDENTIFIER_THUMBPRINT_IDENTIFIER.equals(keyIdentifier) + || WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE.equals( keyIdentifier))) { properties.setIncludeSignatureToken(true); } else { @@ -561,7 +561,7 @@ public abstract class AbstractStaxBindingHandler extends AbstractCommonBindingHa } else if (x509Token.isRequireKeyIdentifierReference()) { identifier = WSSecurityTokenConstants.KeyIdentifier_SkiKeyIdentifier; } else if (x509Token.isRequireThumbprintReference()) { - identifier = WSSecurityTokenConstants.KeyIdentifier_ThumbprintIdentifier; + identifier = WSSecurityTokenConstants.KEYIDENTIFIER_THUMBPRINT_IDENTIFIER; } } else if (token instanceof KeyValueToken) { identifier = WSSecurityTokenConstants.KeyIdentifier_KeyValue; @@ -579,7 +579,7 @@ public abstract class AbstractStaxBindingHandler extends AbstractCommonBindingHa identifier = WSSecurityTokenConstants.KeyIdentifier_IssuerSerial; } else if (wss instanceof Wss11 && ((Wss11) wss).isMustSupportRefThumbprint()) { - identifier = WSSecurityTokenConstants.KeyIdentifier_ThumbprintIdentifier; + identifier = WSSecurityTokenConstants.KEYIDENTIFIER_THUMBPRINT_IDENTIFIER; } } else if (token.getIncludeTokenType() == IncludeTokenType.INCLUDE_TOKEN_ALWAYS_TO_RECIPIENT && !isRequestor() && token instanceof X509Token) { @@ -593,7 +593,7 @@ public abstract class AbstractStaxBindingHandler extends AbstractCommonBindingHa return identifier; } - return WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference; + return WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE; } protected Map handleSupportingTokens( http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxAsymmetricBindingHandler.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxAsymmetricBindingHandler.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxAsymmetricBindingHandler.java index 1a9c6cf..a826606 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxAsymmetricBindingHandler.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxAsymmetricBindingHandler.java @@ -370,8 +370,8 @@ public class StaxAsymmetricBindingHandler extends AbstractStaxBindingHandler { if (encrToken instanceof X509Token && isTokenRequired(encrToken.getIncludeTokenType()) && (WSSecurityTokenConstants.KeyIdentifier_IssuerSerial.equals(keyIdentifier) - || WSSecurityTokenConstants.KeyIdentifier_ThumbprintIdentifier.equals(keyIdentifier) - || WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference.equals( + || WSSecurityTokenConstants.KEYIDENTIFIER_THUMBPRINT_IDENTIFIER.equals(keyIdentifier) + || WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE.equals( keyIdentifier))) { properties.setIncludeEncryptionToken(true); } else { http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java index 9a42984..97e4c65 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java @@ -431,29 +431,29 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { if (isRequestor()) { properties.setEncryptionKeyIdentifier(getKeyIdentifierType(encrToken)); properties.setDerivedKeyKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference); + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE); } else if (recToken.getToken() instanceof KerberosToken && !isRequestor()) { properties.setEncryptionKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_KerberosSha1Identifier); + WSSecurityTokenConstants.KEYIDENTIFIER_KERBEROS_SHA1_IDENTIFIER); properties.setDerivedKeyKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_KerberosSha1Identifier); + WSSecurityTokenConstants.KEYIDENTIFIER_KERBEROS_SHA1_IDENTIFIER); if (recToken.getToken().getDerivedKeys() == DerivedKeys.RequireDerivedKeys) { properties.setEncryptionKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference); + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE); } } else if ((recToken.getToken() instanceof IssuedToken || recToken.getToken() instanceof SecureConversationToken || recToken.getToken() instanceof SpnegoContextToken) && !isRequestor()) { properties.setEncryptionKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference); + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE); } else { properties.setEncryptionKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_EncryptedKeySha1Identifier); + WSSecurityTokenConstants.KEYIDENTIFIER_ENCRYPTED_KEY_SHA1_IDENTIFIER); if (recToken.getToken().getDerivedKeys() == DerivedKeys.RequireDerivedKeys) { properties.setDerivedKeyKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_EncryptedKeySha1Identifier); + WSSecurityTokenConstants.KEYIDENTIFIER_ENCRYPTED_KEY_SHA1_IDENTIFIER); properties.setEncryptionKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference); + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE); properties.setEncryptSymmetricEncryptionKey(false); } } @@ -463,8 +463,8 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { if (encrToken instanceof X509Token && isTokenRequired(encrToken.getIncludeTokenType()) && (WSSecurityTokenConstants.KeyIdentifier_IssuerSerial.equals(keyIdentifier) - || WSSecurityTokenConstants.KeyIdentifier_ThumbprintIdentifier.equals(keyIdentifier) - || WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference.equals( + || WSSecurityTokenConstants.KEYIDENTIFIER_THUMBPRINT_IDENTIFIER.equals(keyIdentifier) + || WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE.equals( keyIdentifier))) { properties.setIncludeEncryptionToken(true); } else { @@ -554,28 +554,28 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { WSSecurityTokenConstants.KeyIdentifier_EncryptedKey); } else { properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_EncryptedKeySha1Identifier); + WSSecurityTokenConstants.KEYIDENTIFIER_ENCRYPTED_KEY_SHA1_IDENTIFIER); if (wrapper.getToken().getDerivedKeys() == DerivedKeys.RequireDerivedKeys) { properties.setDerivedKeyKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_EncryptedKeySha1Identifier); + WSSecurityTokenConstants.KEYIDENTIFIER_ENCRYPTED_KEY_SHA1_IDENTIFIER); properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference); + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE); } } } else if (policyToken instanceof KerberosToken) { if (isRequestor()) { properties.setDerivedKeyKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference); + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE); } else { if (wrapper.getToken().getDerivedKeys() == DerivedKeys.RequireDerivedKeys) { properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference); + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE); } else { properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_KerberosSha1Identifier); + WSSecurityTokenConstants.KEYIDENTIFIER_KERBEROS_SHA1_IDENTIFIER); } properties.setDerivedKeyKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_KerberosSha1Identifier); + WSSecurityTokenConstants.KEYIDENTIFIER_KERBEROS_SHA1_IDENTIFIER); } } else if (policyToken instanceof IssuedToken || policyToken instanceof SecurityContextToken || policyToken instanceof SecureConversationToken || policyToken instanceof SpnegoContextToken) { @@ -585,7 +585,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { properties.setIncludeSignatureToken(true); } properties.setDerivedKeyKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference); + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE); } if (sigToken.getDerivedKeys() == DerivedKeys.RequireDerivedKeys) { http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripTest.java index 3350ce5..729ee1f 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripTest.java @@ -896,7 +896,7 @@ public class StaxRoundTripTest extends AbstractSecurityTest { properties.setCallbackHandler(new KeystorePasswordCallback()); properties.setUseSingleCert(true); properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE ); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(properties); http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMEncryptionIdentifierTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMEncryptionIdentifierTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMEncryptionIdentifierTest.java index 1eb5e4c..71205f7 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMEncryptionIdentifierTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMEncryptionIdentifierTest.java @@ -72,7 +72,7 @@ public class StaxToDOMEncryptionIdentifierTest extends AbstractSecurityTest { properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setEncryptionKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE ); properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); @@ -150,7 +150,7 @@ public class StaxToDOMEncryptionIdentifierTest extends AbstractSecurityTest { properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setEncryptionKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_ThumbprintIdentifier + WSSecurityTokenConstants.KEYIDENTIFIER_THUMBPRINT_IDENTIFIER ); properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); @@ -229,7 +229,7 @@ public class StaxToDOMEncryptionIdentifierTest extends AbstractSecurityTest { properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setEncryptionKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_EncryptedKeySha1Identifier + WSSecurityTokenConstants.KEYIDENTIFIER_ENCRYPTED_KEY_SHA1_IDENTIFIER ); properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMRoundTripTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMRoundTripTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMRoundTripTest.java index 686f380..926718a 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMRoundTripTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMRoundTripTest.java @@ -907,7 +907,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { properties.setCallbackHandler(new KeystorePasswordCallback()); properties.setUseSingleCert(true); properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE ); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(properties); http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMSignatureIdentifierTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMSignatureIdentifierTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMSignatureIdentifierTest.java index c8479fd..a81eab0 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMSignatureIdentifierTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMSignatureIdentifierTest.java @@ -71,7 +71,7 @@ public class StaxToDOMSignatureIdentifierTest extends AbstractSecurityTest { actions.add(WSSConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE ); properties.setSignatureUser("myalias"); @@ -147,7 +147,7 @@ public class StaxToDOMSignatureIdentifierTest extends AbstractSecurityTest { actions.add(WSSConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_ThumbprintIdentifier + WSSecurityTokenConstants.KEYIDENTIFIER_THUMBPRINT_IDENTIFIER ); properties.setSignatureUser("myalias"); http://git-wip-us.apache.org/repos/asf/cxf/blob/66bb668c/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/StaxToDOMSamlTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/StaxToDOMSamlTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/StaxToDOMSamlTest.java index 701b8eb..07d4f4f 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/StaxToDOMSamlTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/saml/StaxToDOMSamlTest.java @@ -165,7 +165,7 @@ public class StaxToDOMSamlTest extends AbstractSecurityTest { properties.setCallbackHandler(new PasswordCallbackHandler()); properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE ); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(properties); @@ -323,7 +323,7 @@ public class StaxToDOMSamlTest extends AbstractSecurityTest { properties.setCallbackHandler(new PasswordCallbackHandler()); properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE ); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(properties); @@ -414,7 +414,7 @@ public class StaxToDOMSamlTest extends AbstractSecurityTest { CryptoFactory.getProperties("alice.properties", this.getClass().getClassLoader()); properties.setSignatureCryptoProperties(cryptoProperties); properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE ); properties.setCallbackHandler(new PasswordCallbackHandler()); @@ -528,7 +528,7 @@ public class StaxToDOMSamlTest extends AbstractSecurityTest { CryptoFactory.getProperties("alice.properties", this.getClass().getClassLoader()); properties.setSignatureCryptoProperties(cryptoProperties); properties.setSignatureKeyIdentifier( - WSSecurityTokenConstants.KeyIdentifier_SecurityTokenDirectReference + WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE ); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(properties);