All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.ws.security.WSSConfig Maven / Gradle / Ivy

Go to download

The Apache WSS4J project provides a Java implementation of the primary security standards for Web Services, namely the OASIS Web Services Security (WS-Security) specifications from the OASIS Web Services Security TC.

There is a newer version: 1.6.19
Show newest version
/**
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements. See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership. The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License. You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing,
 * software distributed under the License is distributed on an
 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 * KIND, either express or implied. See the License for the
 * specific language governing permissions and limitations
 * under the License.
 */

package org.apache.ws.security;

import java.lang.reflect.Field;
import java.security.AccessController;
import java.security.PrivilegedAction;
import java.security.PrivilegedExceptionAction;
import java.security.Provider;
import java.security.Security;
import java.util.HashMap;
import java.util.Map;

import javax.xml.namespace.QName;

import org.apache.ws.security.action.Action;
import org.apache.ws.security.processor.Processor;
import org.apache.ws.security.util.Loader;
import org.apache.ws.security.util.UUIDGenerator;
import org.apache.ws.security.validate.Validator;
import org.apache.xml.security.utils.XMLUtils;

/**
 * WSSConfig 

Carries configuration data so the WSS4J spec compliance can be * modified in runtime. Configure an instance of this object only if you need * WSS4J to emulate certain industry clients or previous OASIS specifications * for WS-Security interoperability testing purposes.

The default settings * follow the latest OASIS and changing anything might violate the OASIS specs. *

WARNING: changing the default settings will break the compliance with * the latest specs. Do this only if you know what you are doing.

* * @author Rami Jaamour ([email protected]) * @author Werner Dittmann ([email protected]) */ public class WSSConfig { private static final org.apache.commons.logging.Log LOG = org.apache.commons.logging.LogFactory.getLog(WSSConfig.class); /** * The default collection of actions supported by the toolkit. */ private static final Map> DEFAULT_ACTIONS; static { final Map> tmp = new HashMap>(); try { tmp.put( Integer.valueOf(WSConstants.UT), org.apache.ws.security.action.UsernameTokenAction.class ); tmp.put( Integer.valueOf(WSConstants.ENCR), org.apache.ws.security.action.EncryptionAction.class ); tmp.put( Integer.valueOf(WSConstants.SIGN), org.apache.ws.security.action.SignatureAction.class ); tmp.put( Integer.valueOf(WSConstants.ST_SIGNED), org.apache.ws.security.action.SAMLTokenSignedAction.class ); tmp.put( Integer.valueOf(WSConstants.ST_UNSIGNED), org.apache.ws.security.action.SAMLTokenUnsignedAction.class ); tmp.put( Integer.valueOf(WSConstants.TS), org.apache.ws.security.action.TimestampAction.class ); tmp.put( Integer.valueOf(WSConstants.UT_SIGN), org.apache.ws.security.action.UsernameTokenSignedAction.class ); tmp.put( Integer.valueOf(WSConstants.SC), org.apache.ws.security.action.SignatureConfirmationAction.class ); } catch (final Exception ex) { if (LOG.isDebugEnabled()) { LOG.debug(ex.getMessage(), ex); } } DEFAULT_ACTIONS = java.util.Collections.unmodifiableMap(tmp); } /** * The default collection of processors supported by the toolkit */ private static final Map> DEFAULT_PROCESSORS; static { final Map> tmp = new HashMap>(); try { tmp.put( WSSecurityEngine.SAML_TOKEN, org.apache.ws.security.processor.SAMLTokenProcessor.class ); tmp.put( WSSecurityEngine.SAML2_TOKEN, org.apache.ws.security.processor.SAMLTokenProcessor.class ); tmp.put( WSSecurityEngine.ENCRYPTED_KEY, org.apache.ws.security.processor.EncryptedKeyProcessor.class ); tmp.put( WSSecurityEngine.SIGNATURE, org.apache.ws.security.processor.SignatureProcessor.class ); tmp.put( WSSecurityEngine.TIMESTAMP, org.apache.ws.security.processor.TimestampProcessor.class ); tmp.put( WSSecurityEngine.USERNAME_TOKEN, org.apache.ws.security.processor.UsernameTokenProcessor.class ); tmp.put( WSSecurityEngine.REFERENCE_LIST, org.apache.ws.security.processor.ReferenceListProcessor.class ); tmp.put( WSSecurityEngine.SIGNATURE_CONFIRMATION, org.apache.ws.security.processor.SignatureConfirmationProcessor.class ); tmp.put( WSSecurityEngine.DERIVED_KEY_TOKEN_05_02, org.apache.ws.security.processor.DerivedKeyTokenProcessor.class ); tmp.put( WSSecurityEngine.DERIVED_KEY_TOKEN_05_12, tmp.get(WSSecurityEngine.DERIVED_KEY_TOKEN_05_02) ); tmp.put( WSSecurityEngine.SECURITY_CONTEXT_TOKEN_05_02, org.apache.ws.security.processor.SecurityContextTokenProcessor.class ); tmp.put( WSSecurityEngine.SECURITY_CONTEXT_TOKEN_05_12, tmp.get(WSSecurityEngine.SECURITY_CONTEXT_TOKEN_05_02) ); tmp.put( WSSecurityEngine.BINARY_TOKEN, org.apache.ws.security.processor.BinarySecurityTokenProcessor.class ); tmp.put( WSSecurityEngine.ENCRYPTED_DATA, org.apache.ws.security.processor.EncryptedDataProcessor.class ); } catch (final Exception ex) { if (LOG.isDebugEnabled()) { LOG.debug(ex.getMessage(), ex); } } DEFAULT_PROCESSORS = java.util.Collections.unmodifiableMap(tmp); } /** * The default collection of validators supported by the toolkit */ private static final Map> DEFAULT_VALIDATORS; static { final Map> tmp = new HashMap>(); try { tmp.put( WSSecurityEngine.SAML_TOKEN, org.apache.ws.security.validate.SamlAssertionValidator.class ); tmp.put( WSSecurityEngine.SAML2_TOKEN, org.apache.ws.security.validate.SamlAssertionValidator.class ); tmp.put( WSSecurityEngine.SIGNATURE, org.apache.ws.security.validate.SignatureTrustValidator.class ); tmp.put( WSSecurityEngine.TIMESTAMP, org.apache.ws.security.validate.TimestampValidator.class ); tmp.put( WSSecurityEngine.USERNAME_TOKEN, org.apache.ws.security.validate.UsernameTokenValidator.class ); } catch (final Exception ex) { if (LOG.isDebugEnabled()) { LOG.debug(ex.getMessage(), ex); } } DEFAULT_VALIDATORS = java.util.Collections.unmodifiableMap(tmp); } protected boolean wsiBSPCompliant = true; /** * Set the timestamp precision mode. If set to true then use * timestamps with milliseconds, otherwise omit the milliseconds. As per XML * Date/Time specification the default is to include the milliseconds. */ protected boolean precisionInMilliSeconds = true; protected boolean enableSignatureConfirmation = false; /** * If set to true then the timestamp handling will throw an exception if the * timestamp contains an expires element and the semantics are expired. * * If set to false, no exception will be thrown, even if the semantics are * expired. */ protected boolean timeStampStrict = true; /** * If this value is not null, then username token handling will throw an * exception if the password type of the Username Token does not match this value */ protected String requiredPasswordType = null; /** * This variable controls whether a UsernameToken with no password element is allowed. * The default value is "false". Set it to "true" to allow deriving keys from UsernameTokens * or to support UsernameTokens for purposes other than authentication. */ protected boolean allowUsernameTokenNoPassword = false; /** * The time in seconds between creation and expiry for a Timestamp. The default * is 300 seconds (5 minutes). */ protected int timeStampTTL = 300; /** * The time in seconds in the future within which the Created time of an incoming * Timestamp is valid. The default is 60 seconds. */ protected int timeStampFutureTTL = 60; /** * The time in seconds between creation and expiry for a UsernameToken Created * element. The default is 300 seconds (5 minutes). */ protected int utTTL = 300; /** * The time in seconds in the future within which the Created time of an incoming * UsernameToken is valid. The default is 60 seconds. */ protected int utFutureTTL = 60; /** * This variable controls whether types other than PasswordDigest or PasswordText * are allowed when processing UsernameTokens. * * By default this is set to false so that the user doesn't have to explicitly * reject custom token types in the callback handler. */ protected boolean handleCustomPasswordTypes = false; /** * This variable controls whether (wsse) namespace qualified password types are * accepted when processing UsernameTokens. * * By default this is set to false. */ protected boolean allowNamespaceQualifiedPasswordTypes = false; /** * The secret key length to be used for UT_SIGN. */ protected int secretKeyLength = WSConstants.WSE_DERIVED_KEY_LEN; /** * Whether the password should be treated as a binary value. This * is needed to properly handle password equivalence for UsernameToken * passwords. Binary passwords are Base64 encoded so they can be * treated as strings in most places, but when the password digest * is calculated or a key is derived from the password, the password * will be Base64 decoded before being used. This is most useful for * hashed passwords as password equivalents. * * See https://issues.apache.org/jira/browse/WSS-239 */ protected boolean passwordsAreEncoded = false; /** * The default wsu:Id allocator is a simple "start at 1 and increment up" * thing that is very fast. */ public static final WsuIdAllocator DEFAULT_ID_ALLOCATOR = new WsuIdAllocator() { int i; private synchronized String next() { return Integer.toString(++i); } public String createId(String prefix, Object o) { if (prefix == null) { return "_" + next(); } return prefix + next(); } public String createSecureId(String prefix, Object o) { if (prefix == null) { return UUIDGenerator.getUUID(); } return prefix + UUIDGenerator.getUUID(); } }; protected WsuIdAllocator idAllocator = DEFAULT_ID_ALLOCATOR; /** * The known actions. This map is of the form > or * . * The known actions are initialized from a set of defaults, * but the list may be modified via the setAction operations. */ private final Map actionMap = new HashMap(DEFAULT_ACTIONS); /** * The known processors. This map is of the form > or * . * The known processors are initialized from a set of defaults, * but the list may be modified via the setProcessor operations. */ private final Map processorMap = new HashMap(DEFAULT_PROCESSORS); /** * The known validators. This map is of the form > or * . * The known validators are initialized from a set of defaults, * but the list may be modified via the setValidator operations. */ private final Map validatorMap = new HashMap(DEFAULT_VALIDATORS); /** * a static boolean flag that determines whether default JCE providers * should be added at the time of construction. * * These providers, and the order in which they are added, can interfere * with some JVMs (such as IBMs). */ private static boolean addJceProviders = true; /** * a boolean flag to record whether we have already been statically * initialized. This flag prevents repeated and unnecessary calls * to static initialization code at construction time. */ private static boolean staticallyInitialized = false; /** * Set the value of the internal addJceProviders flag. This flag * turns on (or off) automatic registration of known JCE providers * that provide necessary cryptographic algorithms for use with WSS4J. * By default, this flag is true. You may wish (or need) to initialize * the JCE manually, e.g., in some JVMs. */ public static void setAddJceProviders(boolean value) { addJceProviders = value; } private static void setXmlSecIgnoreLineBreak() { //really need to make sure ignoreLineBreaks is set to boolean wasSet = false; try { // Don't override if it was set explicitly wasSet = AccessController.doPrivileged(new PrivilegedAction() { public Boolean run() { String lineBreakPropName = "org.apache.xml.security.ignoreLineBreaks"; if (System.getProperty(lineBreakPropName) == null) { System.setProperty(lineBreakPropName, "true"); return false; } return true; } }); } catch (Throwable t) { //NOPMD //ignore } org.apache.xml.security.Init.init(); if (!wasSet) { try { AccessController.doPrivileged(new PrivilegedExceptionAction() { public Boolean run() throws Exception { Field f = XMLUtils.class.getDeclaredField("ignoreLineBreaks"); f.setAccessible(true); f.set(null, Boolean.TRUE); return false; } }); } catch (Throwable t) { //NOPMD //ignore } } } public static synchronized void init() { if (!staticallyInitialized) { if (addJceProviders) { setXmlSecIgnoreLineBreak(); AccessController.doPrivileged(new PrivilegedAction() { public Boolean run() { addXMLDSigRI(); addJceProvider("BC", "org.bouncycastle.jce.provider.BouncyCastleProvider"); Security.removeProvider("STRTransform"); appendJceProvider( "STRTransform", new org.apache.ws.security.transform.STRTransformProvider() ); return true; } }); } staticallyInitialized = true; } } private static void addXMLDSigRI() { try { addXMLDSigRIInternal(); } catch (Throwable t) { //ignore - may be a NoClassDefFound if XMLDSigRI isn't avail return; } } public static void addXMLDSigRIInternal() { addJceProvider("ApacheXMLDSig", SantuarioUtil.getSantuarioProvider()); } /** * @return a new WSSConfig instance configured with the default values */ public static WSSConfig getNewInstance() { init(); return new WSSConfig(); } /** * Checks if we are in WS-I Basic Security Profile compliance mode * * @return whether we are in WS-I Basic Security Profile compliance mode */ public boolean isWsiBSPCompliant() { return wsiBSPCompliant; } /** * Set the WS-I Basic Security Profile compliance mode. The default is true. * * @param wsiBSPCompliant */ public void setWsiBSPCompliant(boolean wsiBSPCompliant) { this.wsiBSPCompliant = wsiBSPCompliant; } /** * Checks if we need to use milliseconds in timestamps * * @return whether to use precision in milliseconds for timestamps */ public boolean isPrecisionInMilliSeconds() { return precisionInMilliSeconds; } /** * Set the precision in milliseconds for timestamps * * @param precisionInMilliSeconds whether to use precision in milliseconds for timestamps */ public void setPrecisionInMilliSeconds(boolean precisionInMilliSeconds) { this.precisionInMilliSeconds = precisionInMilliSeconds; } /** * @return Returns the enableSignatureConfirmation. */ public boolean isEnableSignatureConfirmation() { return enableSignatureConfirmation; } /** * @param enableSignatureConfirmation * The enableSignatureConfirmation to set. */ public void setEnableSignatureConfirmation(boolean enableSignatureConfirmation) { this.enableSignatureConfirmation = enableSignatureConfirmation; } /** * @param handleCustomTypes * whether to handle custom UsernameToken password types or not */ public void setHandleCustomPasswordTypes(boolean handleCustomTypes) { this.handleCustomPasswordTypes = handleCustomTypes; } /** * @return whether custom UsernameToken password types are allowed or not */ public boolean getHandleCustomPasswordTypes() { return handleCustomPasswordTypes; } /** * @param allowNamespaceQualifiedTypes * whether (wsse) namespace qualified password types are accepted or not */ public void setAllowNamespaceQualifiedPasswordTypes(boolean allowNamespaceQualifiedTypes) { allowNamespaceQualifiedPasswordTypes = allowNamespaceQualifiedTypes; } /** * @return whether (wsse) namespace qualified password types are accepted or not */ public boolean getAllowNamespaceQualifiedPasswordTypes() { return allowNamespaceQualifiedPasswordTypes; } /** * @return Returns if we shall throw an exception on expired request * semantic */ public boolean isTimeStampStrict() { return timeStampStrict; } /** * @param timeStampStrict * If true throw an exception on expired request semantic */ public void setTimeStampStrict(boolean timeStampStrict) { this.timeStampStrict = timeStampStrict; } /** * @return the required password type when processing a UsernameToken */ public String getRequiredPasswordType() { return requiredPasswordType; } /** * @param requiredPasswordType The required password type when processing * a Username Token. */ public void setRequiredPasswordType(String requiredPasswordType) { this.requiredPasswordType = requiredPasswordType; } /** * @return Returns the TTL of a Timestamp in seconds */ public int getTimeStampTTL() { return timeStampTTL; } /** * @param timeStampTTL The new value for timeStampTTL */ public void setTimeStampTTL(int timeStampTTL) { this.timeStampTTL = timeStampTTL; } /** * @return Returns the Future TTL of a Timestamp in seconds */ public int getTimeStampFutureTTL() { return timeStampFutureTTL; } /** * @param timeStampFutureTTL the new value for timeStampFutureTTL */ public void setTimeStampFutureTTL(int timeStampFutureTTL) { this.timeStampFutureTTL = timeStampFutureTTL; } /** * Set the secret key length to be used for UT_SIGN. */ public void setSecretKeyLength(int length) { secretKeyLength = length; } /** * Get the secret key length to be used for UT_SIGN. */ public int getSecretKeyLength() { return secretKeyLength; } /** * @param passwordsAreEncoded * whether passwords are encoded */ public void setPasswordsAreEncoded(boolean passwordsAreEncoded) { this.passwordsAreEncoded = passwordsAreEncoded; } /** * @return whether passwords are encoded */ public boolean getPasswordsAreEncoded() { return passwordsAreEncoded; } /** * @return Returns the WsuIdAllocator used to generate wsu:Id attributes */ public WsuIdAllocator getIdAllocator() { return idAllocator; } public void setIdAllocator(WsuIdAllocator idAllocator) { this.idAllocator = idAllocator; } /** * Associate an action instance with a specific action code. * * This operation allows applications to supply their own * actions for well-known operations. * * Please note that the Action object does NOT get class-loaded per invocation, and so * it is up to the implementing class to ensure that it is thread-safe. */ public Class setAction(int code, Action action) { Object result = actionMap.put(Integer.valueOf(code), action); if (result instanceof Class) { return (Class)result; } else if (result instanceof Action) { return result.getClass(); } return null; } /** * Associate an action instance with a specific action code. * * This operation allows applications to supply their own * actions for well-known operations. */ public Class setAction(int code, Class clazz) { Object result = actionMap.put(Integer.valueOf(code), clazz); if (result instanceof Class) { return (Class)result; } else if (result instanceof Action) { return result.getClass(); } return null; } /** * Lookup action * * @param action * @return An action class to create a security token * @throws WSSecurityException */ public Action getAction(int action) throws WSSecurityException { final Object actionObject = actionMap.get(Integer.valueOf(action)); if (actionObject instanceof Class) { try { return (Action)((Class)actionObject).newInstance(); } catch (Throwable t) { if (LOG.isDebugEnabled()) { LOG.debug(t.getMessage(), t); } throw new WSSecurityException(WSSecurityException.FAILURE, "unableToLoadClass", new Object[] { ((Class)actionObject).getName() }, t); } } else if (actionObject instanceof Action) { return (Action)actionObject; } return null; } /** * Associate a SOAP processor name with a specified SOAP Security header * element QName. Processors registered under this QName will be * called when processing header elements with the specified type. * * Please note that the Processor object does NOT get class-loaded per invocation, and so * it is up to the implementing class to ensure that it is thread-safe. */ public Class setProcessor(QName el, Processor processor) { Object result = processorMap.put(el, processor); if (result instanceof Class) { return (Class)result; } else if (result instanceof Processor) { return result.getClass(); } return null; } /** * Associate a SOAP processor name with a specified SOAP Security header * element QName. Processors registered under this QName will be * called when processing header elements with the specified type. */ public Class setProcessor(QName el, Class clazz) { Object result = processorMap.put(el, clazz); if (result instanceof Class) { return (Class)result; } else if (result instanceof Processor) { return result.getClass(); } return null; } /** * Associate a SOAP validator name with a specified SOAP Security header * element QName. Validators registered under this QName will be * called when processing header elements with the specified type. * * Please note that the Validator object does NOT get class-loaded per invocation, and so * it is up to the implementing class to ensure that it is thread-safe. */ public Class setValidator(QName el, Validator validator) { Object result = validatorMap.put(el, validator); if (result instanceof Class) { return (Class)result; } else if (result instanceof Validator) { return result.getClass(); } return null; } /** * Associate a SOAP validator name with a specified SOAP Security header * element QName. validator registered under this QName will be * called when processing header elements with the specified type. */ public Class setValidator(QName el, Class clazz) { Object result = validatorMap.put(el, clazz); if (result instanceof Class) { return (Class)result; } else if (result instanceof Validator) { return result.getClass(); } return null; } /** * @return the SOAP Validator associated with the specified * QName. The QName is intended to refer to an element * in a SOAP security header. This operation returns * null if there is no Validator associated with the * specified QName. */ public Validator getValidator(QName el) throws WSSecurityException { final Object validatorObject = validatorMap.get(el); if (validatorObject instanceof Class) { try { return (Validator)((Class)validatorObject).newInstance(); } catch (Throwable t) { if (LOG.isDebugEnabled()) { LOG.debug(t.getMessage(), t); } throw new WSSecurityException(WSSecurityException.FAILURE, "unableToLoadClass", new Object[] { ((Class)validatorObject).getName() }, t); } } else if (validatorObject instanceof Validator) { return (Validator)validatorObject; } return null; } /** * @return the SOAP processor associated with the specified * QName. The QName is intended to refer to an element * in a SOAP security header. This operation returns * null if there is no processor associated with the * specified QName. */ public Processor getProcessor(QName el) throws WSSecurityException { final Object processorObject = processorMap.get(el); if (processorObject instanceof Class) { try { return (Processor)((Class)processorObject).newInstance(); } catch (Throwable t) { if (LOG.isDebugEnabled()) { LOG.debug(t.getMessage(), t); } throw new WSSecurityException(WSSecurityException.FAILURE, "unableToLoadClass", new Object[] { ((Class)processorObject).getName() }, t); } } else if (processorObject instanceof Processor) { return (Processor)processorObject; } return null; } /** * Add a new JCE security provider to use for WSS4J, of the specified name and class. Return * either the name of the previously loaded provider, the name of the new loaded provider, or * null if there's an exception in loading the provider. Add the provider either after the SUN * provider (see WSS-99), or the IBMJCE provider. Otherwise fall back to the old behaviour of * inserting the provider in position 2. * * @param name * The name string of the provider (this may not be the real name of the provider) * @param className * Name of the class the implements the provider. This class must * be a subclass of java.security.Provider * * @return Returns the actual name of the provider that was loaded */ public static String addJceProvider(String name, String className) { Provider currentProvider = Security.getProvider(name); if (currentProvider == null) { try { Class clazz = Loader.loadClass(className, false, Provider.class); Provider provider = clazz.newInstance(); return addJceProvider(name, provider); } catch (Throwable t) { if (LOG.isDebugEnabled()) { LOG.debug("The provider " + name + " could not be added: " + t.getMessage(), t); } return null; } } return currentProvider.getName(); } /** * Add a new JCE security provider to use for WSS4J, of the specified name and class. Return * either the name of the previously loaded provider, the name of the new loaded provider, or * null if there's an exception in loading the provider. Add the provider either after the SUN * provider (see WSS-99), or the IBMJCE provider. Otherwise fall back to the old behaviour of * inserting the provider in position 2. * * @param name * The name string of the provider (this may not be the real name of the provider) * @param provider * A subclass of java.security.Provider * * @return Returns the actual name of the provider that was loaded */ public static String addJceProvider(String name, Provider provider) { Provider currentProvider = Security.getProvider(name); if (currentProvider == null) { try { // // Install the provider after the SUN provider (see WSS-99) // Otherwise fall back to the old behaviour of inserting // the provider in position 2. For AIX, install it after // the IBMJCE provider. // int ret = 0; Provider[] provs = Security.getProviders(); for (int i = 0; i < provs.length; i++) { if ("SUN".equals(provs[i].getName()) || "IBMJCE".equals(provs[i].getName())) { ret = Security.insertProviderAt(provider, i + 2); break; } } if (ret == 0) { ret = Security.insertProviderAt(provider, 2); } if (LOG.isDebugEnabled()) { LOG.debug( "The provider " + provider.getName() + " - " + provider.getVersion() + " was added at position: " + ret ); } return provider.getName(); } catch (Throwable t) { if (LOG.isDebugEnabled()) { LOG.debug("The provider " + name + " could not be added: " + t.getMessage(), t); } return null; } } return currentProvider.getName(); } /** * Add a new JCE security provider to use for WSS4J, of the specified name and class. Return * either the name of the previously loaded provider, the name of the new loaded provider, or * null if there's an exception in loading the provider. Append the provider to the provider * list. * * @param name * The name string of the provider (this may not be the real name of the provider) * @param className * Name of the class the implements the provider. This class must * be a subclass of java.security.Provider * * @return Returns the actual name of the provider that was loaded */ public static String appendJceProvider(String name, String className) { Provider currentProvider = Security.getProvider(name); if (currentProvider == null) { try { Class clazz = Loader.loadClass(className, false, Provider.class); Provider provider = clazz.newInstance(); int ret = Security.addProvider(provider); if (LOG.isDebugEnabled()) { LOG.debug( "The provider " + provider.getName() + " was added at position: " + ret ); } return provider.getName(); } catch (Throwable t) { if (LOG.isDebugEnabled()) { LOG.debug("The provider " + name + " could not be added: " + t.getMessage(), t); } return null; } } return currentProvider.getName(); } /** * Add a new JCE security provider to use for WSS4J, of the specified name and class. Return * either the name of the previously loaded provider, the name of the new loaded provider, or * null if there's an exception in loading the provider. Append the provider to the provider * list. * * @param name * The name string of the provider (this may not be the real name of the provider) * @param provider * A subclass of java.security.Provider * * @return Returns the actual name of the provider that was loaded */ public static String appendJceProvider(String name, Provider provider) { Provider currentProvider = Security.getProvider(name); if (currentProvider == null) { try { int ret = Security.addProvider(provider); if (LOG.isDebugEnabled()) { LOG.debug( "The provider " + provider.getName() + " was added at position: " + ret ); } return provider.getName(); } catch (Throwable t) { if (LOG.isDebugEnabled()) { LOG.debug("The provider " + name + " could not be added: " + t.getMessage(), t); } return null; } } return currentProvider.getName(); } public boolean isAllowUsernameTokenNoPassword() { return allowUsernameTokenNoPassword; } public void setAllowUsernameTokenNoPassword(boolean allowUsernameTokenNoPassword) { this.allowUsernameTokenNoPassword = allowUsernameTokenNoPassword; } public int getUtTTL() { return utTTL; } public void setUtTTL(int utTTL) { this.utTTL = utTTL; } public int getUtFutureTTL() { return utFutureTTL; } public void setUtFutureTTL(int utFutureTTL) { this.utFutureTTL = utFutureTTL; } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy