- 使用 Spring Initializr 创建 Spring Boot 应用程序
- 在Spring Boot中配置Cassandra
- 在 Spring Boot 上配置 Tomcat 连接池
- 将Camel消息路由到嵌入WildFly的Artemis上
本文整理了Java中org.apache.ws.security.message.WSSecSignature
类的一些代码示例,展示了WSSecSignature
类的具体用法。这些代码示例主要来源于Github
/Stackoverflow
/Maven
等平台,是从一些精选项目中提取出来的代码,具有较强的参考意义,能在一定程度帮忙到你。WSSecSignature
类的具体详情如下:
包路径:org.apache.ws.security.message.WSSecSignature
类名称:WSSecSignature
[英]Creates a Signature according to WS Specification, X509 profile. This class is a re-factored implementation of the previous WSS4J class WSSignEnvelope
. This new class allows better control of the process to create a Signature and to add it to the Security header. The flexibility and fine granular control is required to implement a handler that uses WSSecurityPolicy files to control the setup of a Security header.
[中]根据WS-Specification X509 profile创建签名。这个类是前一个WSS4J类WSSignEnvelope
的重新分解实现。这个新类允许更好地控制创建签名并将其添加到安全标头的过程。实现使用WSSecurityPolicy文件控制安全头设置的处理程序需要灵活性和细粒度控制。
代码示例来源:origin: CyberSource/cybersource-sdk-java
WSSecSignature sign = new WSSecSignature();
sign.setUserInfo(identities.get(merchantID).getKeyAlias(), password);
sign.setDigestAlgo(DIGEST_ALGORITHM);
sign.setSignatureAlgorithm(SIGNATURE_ALGORITHM);
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
sign.setUseSingleCertificate(true);
sign.setParts(Collections.singletonList(msgBodyPart));
try {
return sign.build(workingDocument, localKeyStoreHandler, secHeader);
} catch (WSSecurityException e) {
logger.log(Logger.LT_EXCEPTION, "Failed while signing requeest for , '" + merchantID + "'");
代码示例来源:origin: org.apache.ws.security/wss4j
/**
* This method adds references to the Signature.
*
* @param references The list of references to sign
* @param secHeader The Security Header
* @throws WSSecurityException
*/
public List<javax.xml.crypto.dsig.Reference> addReferencesToSign(
List<WSEncryptionPart> references,
WSSecHeader secHeader
) throws WSSecurityException {
return
addReferencesToSign(
document,
references,
wsDocInfo,
signatureFactory,
secHeader,
getWsConfig(),
digestAlgo
);
}
代码示例来源:origin: org.apache.ws.security/wss4j
/**
* Compute the Signature over the references. The signature element will be
* prepended to the security header.
*
* This method can be called any time after the references were set. See
* <code>addReferencesToSign()</code>.
*
* @param referenceList The list of references to sign
*
* @throws WSSecurityException
*/
public void computeSignature(
List<javax.xml.crypto.dsig.Reference> referenceList
) throws WSSecurityException {
computeSignature(referenceList, true, null);
}
代码示例来源:origin: org.apache.rampart/rampart-core
WSSecSignature sig = new WSSecSignature();
sig.setWsConfig(rmd.getConfig());
sig.setCustomTokenId(tok.getId().substring(1));
sig.setCustomTokenValueType(RampartUtil.getSAML10AssertionNamespace());
sig.setSecretKey(tok.getSecret());
sig.setSignatureAlgorithm(algorithmSuite.getAsymmetricSignature());
sig.setSignatureAlgorithm(algorithmSuite.getSymmetricSignature());
sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
sig.prepare(rmd.getDocument(), RampartUtil.getSignatureCrypto(rpd
.getRampartConfig(), rmd.getCustomClassLoader()),
rmd.getSecHeader());
sig.setParts(sigParts);
List<Reference> referenceList
= sig.addReferencesToSign(sigParts, rmd.getSecHeader());
sig.computeSignature(referenceList, false, this.getInsertionLocation());
this.setInsertionLocation(sig.getSignatureElement());
return sig.getSignatureValue();
代码示例来源:origin: org.apache.servicemix.bundles/org.apache.servicemix.bundles.wss4j
WSPasswordCallback passwordCallback =
handler.getPasswordCB(reqData.getSignatureUser(), actionToDo, callbackHandler, reqData);
WSSecSignature wsSign = new WSSecSignature(reqData.getWssConfig());
wsSign.setKeyIdentifierType(reqData.getSigKeyId());
wsSign.setSignatureAlgorithm(reqData.getSigAlgorithm());
wsSign.setDigestAlgo(reqData.getSigDigestAlgorithm());
wsSign.setSigCanonicalization(reqData.getSignatureC14nAlgorithm());
wsSign.setUserInfo(reqData.getSignatureUser(), passwordCallback.getPassword());
wsSign.setUseSingleCertificate(reqData.isUseSingleCert());
if (reqData.getSignatureParts().size() > 0) {
wsSign.setParts(reqData.getSignatureParts());
wsSign.setSecretKey(passwordCallback.getKey());
wsSign.prepare(doc, reqData.getSigCrypto(), reqData.getSecHeader());
for (WSEncryptionPart part : reqData.getSignatureParts()) {
if ("STRTransform".equals(part.getName()) && part.getId() == null) {
part.setId(wsSign.getSecurityTokenReferenceURI());
} else if (reqData.isAppendSignatureAfterTimestamp()
&& WSConstants.WSU_NS.equals(part.getNamespace())
wsSign.prependBSTElementToHeader(reqData.getSecHeader());
代码示例来源:origin: org.apache.ws.security/wss4j
WSSecSignature sign = new WSSecSignature(reqData.getWssConfig());
sign.setCustomTokenValueType(WSConstants.USERNAMETOKEN_NS + "#UsernameToken");
sign.setCustomTokenId(builder.getId());
sign.setSecretKey(builder.getSecretKey());
sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
if (reqData.getSigDigestAlgorithm() != null) {
sign.setDigestAlgo(reqData.getSigDigestAlgorithm());
sign.setSignatureAlgorithm(reqData.getSigAlgorithm());
} else {
sign.setSignatureAlgorithm(WSConstants.HMAC_SHA1);
sign.prepare(doc, null, reqData.getSecHeader());
sign.addReferencesToSign(parts, reqData.getSecHeader());
sign.computeSignature(referenceList);
reqData.getSignatureValues().add(sign.getSignatureValue());
} catch (WSSecurityException e) {
throw new WSSecurityException(
代码示例来源:origin: be.e_contract.mycarenet/mycarenet-ehealth-common
securityHeaderElement.appendChild(importedAssertionElement);
WSSecSignature wsSecSignature = new WSSecSignature();
wsSecSignature.setSignatureAlgorithm(WSConstants.RSA);
wsSecSignature.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER);
wsSecSignature
.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE);
wsSecSignature.setCustomTokenId(assertionId);
Crypto crypto = new WSSecurityCrypto(this.privateKey, null);
wsSecSignature.prepare(soapPart, crypto, wsSecHeader);
Vector<WSEncryptionPart> signParts = new Vector<>();
SOAPConstants soapConstants = WSSecurityUtil.getSOAPConstants(soapPart
.getLocalPart(), soapConstants.getEnvelopeURI(), "Content"));
signParts.add(new WSEncryptionPart(wsSecTimeStamp.getId()));
List<Reference> referenceList = wsSecSignature.addReferencesToSign(
signParts, wsSecHeader);
wsSecSignature.computeSignature(referenceList, false, null);
代码示例来源:origin: be.e_contract.mycarenet/mycarenet-ehealth-saml-sts
WSSConfig wssConfig = new WSSConfig();
wssConfig.setWsiBSPCompliant(false);
WSSecSignature sign = new WSSecSignature(wssConfig);
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
sign.prepare(soapPart, crypto, wsSecHeader);
String bstId = sign.getBSTTokenId();
sign.appendBSTElementToHeader(wsSecHeader);
Vector<WSEncryptionPart> signParts = new Vector<>();
SOAPConstants soapConstants = WSSecurityUtil.getSOAPConstants(soapPart
signParts.add(new WSEncryptionPart(bstId));
signParts.add(new WSEncryptionPart(wsSecTimeStamp.getId()));
List<Reference> referenceList = sign.addReferencesToSign(signParts,
wsSecHeader);
sign.computeSignature(referenceList, false, null);
代码示例来源:origin: org.apache.rampart/rampart-core
WSSecSignature sig = new WSSecSignature();
checkForX509PkiPath(sig, token);
sig.setWsConfig(rmd.getConfig());
sig.setUserInfo(user, password);
AlgorithmSuite algorithmSuite = rpd.getAlgorithmSuite();
sig.setSignatureAlgorithm(algorithmSuite.getAsymmetricSignature());
sig.setSigCanonicalization(algorithmSuite.getInclusiveC14n());
sig.setDigestAlgo(algorithmSuite.getDigest());
sig.prepare(rmd.getDocument(), RampartUtil.getSignatureCrypto(rampartConfig, rmd.getCustomClassLoader()),
rmd.getSecHeader());
} catch (WSSecurityException e) {
代码示例来源:origin: org.apache.rampart/rampart-core
Element bstElem = supportingSig.getBinarySecurityTokenElement();
if (bstElem != null) {
bstElem = RampartUtil.insertSiblingAfter(rmd, this.getInsertionLocation(), bstElem);
if (rmd.getPolicyData().isTokenProtection() && supportingSig.getBSTTokenId() != null) {
supportingSigParts.add(new WSEncryptionPart(supportingSig.getBSTTokenId()));
supportingSig.setDigestAlgo(rmd.getPolicyData().getAlgorithmSuite().getDigest());
= supportingSig.addReferencesToSign(supportingSigParts, rmd.getSecHeader());
supportingSig.computeSignature(referenceList, false, this.getInsertionLocation());
signatureValues.add(supportingSig.getSignatureValue());
代码示例来源:origin: org.apache.ws.security/wss4j
prepare(doc, cr, secHeader);
if (parts == null) {
parts = new ArrayList<WSEncryptionPart>(1);
addReferencesToSign(parts, secHeader);
computeSignature(referenceList);
prependBSTElementToHeader(secHeader);
代码示例来源:origin: org.apache.rampart/rampart-core
WSSecSignature sig = (WSSecSignature) tempTok;
if (rmd.getPolicyData().isTokenProtection() &&
sig.getBSTTokenId() != null) {
sigParts.add(new WSEncryptionPart(sig.getBSTTokenId()));
= sig.addReferencesToSign(sigParts, rmd.getSecHeader());
sig.computeSignature(referenceList, false, this.getInsertionLocation());
this.setInsertionLocation(sig.getSignatureElement());
sigValues.add(sig.getSignatureValue());
代码示例来源:origin: org.apache.rampart/rampart-core
sig.appendBSTElementToHeader(rmd.getSecHeader());
sigParts.add(new WSEncryptionPart(sig.getBSTTokenId()));
= sig.addReferencesToSign(sigParts, rmd.getSecHeader());
sig.computeSignature(referenceList, false, null);
return sig.getSignatureValue();
} catch (WSSecurityException e) {
throw new RampartException("errorInSignatureWithX509Token", e);
代码示例来源:origin: org.apache.rampart/rampart-core
WSSecSignature sig = new WSSecSignature();
sig.setWsConfig(rmd.getConfig());
String tokId = tok.getId();
if (tokId.charAt(0) == '#') {
tokId = tokId.substring(1);
sig.setCustomTokenId(tokId);
sig.setCustomTokenValueType(RampartUtil.getSAML10AssertionNamespace());
sig.setSecretKey(tok.getSecret());
sig.setSignatureAlgorithm(algorithmSuite.getAsymmetricSignature());
sig.setSignatureAlgorithm(algorithmSuite.getSymmetricSignature());
sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
sig.prepare(rmd.getDocument(), RampartUtil.getSignatureCrypto(rpd
.getRampartConfig(), rmd.getCustomClassLoader()),
rmd.getSecHeader());
sig.setParts(sigParts);
List<javax.xml.crypto.dsig.Reference> referenceList
= sig.addReferencesToSign(sigParts, rmd.getSecHeader());
sig.computeSignature(referenceList);
rmd,
this.getInsertionLocation(),
sig.getSignatureElement()));
return sig.getSignatureValue();
代码示例来源:origin: org.apache.ws.security/wss4j
WSPasswordCallback passwordCallback =
handler.getPasswordCB(reqData.getSignatureUser(), actionToDo, callbackHandler, reqData);
WSSecSignature wsSign = new WSSecSignature(reqData.getWssConfig());
wsSign.setKeyIdentifierType(reqData.getSigKeyId());
wsSign.setSignatureAlgorithm(reqData.getSigAlgorithm());
wsSign.setDigestAlgo(reqData.getSigDigestAlgorithm());
wsSign.setSigCanonicalization(reqData.getSignatureC14nAlgorithm());
wsSign.setUserInfo(reqData.getSignatureUser(), passwordCallback.getPassword());
wsSign.setUseSingleCertificate(reqData.isUseSingleCert());
if (reqData.getSignatureParts().size() > 0) {
wsSign.setParts(reqData.getSignatureParts());
wsSign.setSecretKey(passwordCallback.getKey());
wsSign.prepare(doc, reqData.getSigCrypto(), reqData.getSecHeader());
for (WSEncryptionPart part : reqData.getSignatureParts()) {
if ("STRTransform".equals(part.getName()) && part.getId() == null) {
part.setId(wsSign.getSecurityTokenReferenceURI());
} else if (reqData.isAppendSignatureAfterTimestamp()
&& WSConstants.WSU_NS.equals(part.getNamespace())
wsSign.prependBSTElementToHeader(reqData.getSecHeader());
代码示例来源:origin: org.apache.servicemix.bundles/org.apache.servicemix.bundles.wss4j
WSSecSignature sign = new WSSecSignature(reqData.getWssConfig());
sign.setCustomTokenValueType(WSConstants.USERNAMETOKEN_NS + "#UsernameToken");
sign.setCustomTokenId(builder.getId());
sign.setSecretKey(builder.getSecretKey());
sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
if (reqData.getSigDigestAlgorithm() != null) {
sign.setDigestAlgo(reqData.getSigDigestAlgorithm());
sign.setSignatureAlgorithm(reqData.getSigAlgorithm());
} else {
sign.setSignatureAlgorithm(WSConstants.HMAC_SHA1);
sign.prepare(doc, null, reqData.getSecHeader());
sign.addReferencesToSign(parts, reqData.getSecHeader());
sign.computeSignature(referenceList);
reqData.getSignatureValues().add(sign.getSignatureValue());
} catch (WSSecurityException e) {
throw new WSSecurityException(
代码示例来源:origin: be.fedict.eid-trust-service/eid-trust-service-xkms2-ws-impl
WSSConfig wssConfig = new WSSConfig();
wssConfig.setWsiBSPCompliant(false);
WSSecSignature sign = new WSSecSignature(wssConfig);
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
sign.prepare(soapPart, crypto, wsSecHeader);
sign.appendBSTElementToHeader(wsSecHeader);
Vector<WSEncryptionPart> signParts = new Vector<WSEncryptionPart>();
signParts.add(new WSEncryptionPart(wsSecTimeStamp.getId()));
.getLocalPart(), soapConstants.getEnvelopeURI(),
"Content"));
sign.addReferencesToSign(signParts, wsSecHeader);
List<Reference> referenceList = sign.addReferencesToSign(
signParts, wsSecHeader);
sign.computeSignature(referenceList, false, null);
代码示例来源:origin: org.apache.rampart/rampart-core
Element bstElem = sig.getBinarySecurityTokenElement();
if(bstElem != null) {
bstElem = RampartUtil.insertSiblingAfter(rmd, this
&& sig.getBSTTokenId() != null) {
sigParts.add(new WSEncryptionPart(sig.getBSTTokenId()));
sig.setDigestAlgo(rpd.getAlgorithmSuite().getDigest());
= sig.addReferencesToSign(sigParts, rmd.getSecHeader());
sig.computeSignature(referenceList, false, this.getInsertionLocation());
} else {
sig.computeSignature(referenceList, true, this.refList);
signatureElement = sig.getSignatureElement();
throw new RampartException("errorInSignatureWithX509Token", e);
signatureValues.add(sig.getSignatureValue());
代码示例来源:origin: org.apache.servicemix.bundles/org.apache.servicemix.bundles.wss4j
prepare(doc, cr, secHeader);
if (parts == null) {
parts = new ArrayList<WSEncryptionPart>(1);
addReferencesToSign(parts, secHeader);
computeSignature(referenceList);
prependBSTElementToHeader(secHeader);
代码示例来源:origin: org.apache.rampart/rampart-core
WSSecSignature sig = new WSSecSignature();
sig.setWsConfig(rmd.getConfig());
sig.setCustomTokenValueType(WSConstants.SOAPMESSAGE_NS11 + "#"
+ WSConstants.ENC_KEY_VALUE_TYPE);
sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
} else {
sig.setEncrKeySha1value(((EncryptedKeyToken) tok).getSHA1());
sig.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER);
sig.setCustomTokenValueType(RampartUtil.getSAML10AssertionNamespace());
sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
OMElement ref = tok.getAttachedReference();
if(ref == null) {
sig.setCustomTokenId(sigTokId);
sig.setSecretKey(tok.getSecret());
sig.setSignatureAlgorithm(algorithmSuite.getAsymmetricSignature()); // TODO what is the correct algorith ? For sure one is redundant
sig.setSignatureAlgorithm(algorithmSuite.getSymmetricSignature());
sig.setDigestAlgo(algorithmSuite.getDigest());
sig.prepare(rmd.getDocument(), RampartUtil.getSignatureCrypto(rpd
.getRampartConfig(), rmd.getCustomClassLoader()),
rmd.getSecHeader());
sig.setParts(sigParts);
List<Reference> referenceList
我在网上搜索但没有找到任何合适的文章解释如何使用 javascript 使用 WCF 服务,尤其是 WebScriptEndpoint。 任何人都可以对此给出任何指导吗? 谢谢 最佳答案 这是一篇关于
我正在编写一个将运行 Linux 命令的 C 程序,例如: cat/etc/passwd | grep 列表 |剪切-c 1-5 我没有任何结果 *这里 parent 等待第一个 child (chi
所以我正在尝试处理文件上传,然后将该文件作为二进制文件存储到数据库中。在我存储它之后,我尝试在给定的 URL 上提供文件。我似乎找不到适合这里的方法。我需要使用数据库,因为我使用 Google 应用引
我正在尝试制作一个宏,将下面的公式添加到单元格中,然后将其拖到整个列中并在 H 列中复制相同的公式 我想在 F 和 H 列中输入公式的数据 Range("F1").formula = "=IF(ISE
问题类似于this one ,但我想使用 OperatorPrecedenceParser 解析带有函数应用程序的表达式在 FParsec . 这是我的 AST: type Expression =
我想通过使用 sequelize 和 node.js 将这个查询更改为代码取决于在哪里 select COUNT(gender) as genderCount from customers where
我正在使用GNU bash,版本5.0.3(1)-发行版(x86_64-pc-linux-gnu),我想知道为什么简单的赋值语句会出现语法错误: #/bin/bash var1=/tmp
这里,为什么我的代码在 IE 中不起作用。我的代码适用于所有浏览器。没有问题。但是当我在 IE 上运行我的项目时,它发现错误。 而且我的 jquery 类和 insertadjacentHTMl 也不
我正在尝试更改标签的innerHTML。我无权访问该表单,因此无法编辑 HTML。标签具有的唯一标识符是“for”属性。 这是输入和标签的结构:
我有一个页面,我可以在其中返回用户帖子,可以使用一些 jquery 代码对这些帖子进行即时评论,在发布新评论后,我在帖子下插入新评论以及删除 按钮。问题是 Delete 按钮在新插入的元素上不起作用,
我有一个大约有 20 列的“管道分隔”文件。我只想使用 sha1sum 散列第一列,它是一个数字,如帐号,并按原样返回其余列。 使用 awk 或 sed 执行此操作的最佳方法是什么? Accounti
我需要将以下内容插入到我的表中...我的用户表有五列 id、用户名、密码、名称、条目。 (我还没有提交任何东西到条目中,我稍后会使用 php 来做)但由于某种原因我不断收到这个错误:#1054 - U
所以我试图有一个输入字段,我可以在其中输入任何字符,但然后将输入的值小写,删除任何非字母数字字符,留下“。”而不是空格。 例如,如果我输入: 地球的 70% 是水,-!*#$^^ & 30% 土地 输
我正在尝试做一些我认为非常简单的事情,但出于某种原因我没有得到想要的结果?我是 javascript 的新手,但对 java 有经验,所以我相信我没有使用某种正确的规则。 这是一个获取输入值、检查选择
我想使用 angularjs 从 mysql 数据库加载数据。 这就是应用程序的工作原理;用户登录,他们的用户名存储在 cookie 中。该用户名显示在主页上 我想获取这个值并通过 angularjs
我正在使用 autoLayout,我想在 UITableViewCell 上放置一个 UIlabel,它应该始终位于单元格的右侧和右侧的中心。 这就是我想要实现的目标 所以在这里你可以看到我正在谈论的
我需要与 MySql 等效的 elasticsearch 查询。我的 sql 查询: SELECT DISTINCT t.product_id AS id FROM tbl_sup_price t
我正在实现代码以使用 JSON。 func setup() { if let flickrURL = NSURL(string: "https://api.flickr.com/
我尝试使用for循环声明变量,然后测试cols和rols是否相同。如果是,它将运行递归函数。但是,我在 javascript 中执行 do 时遇到问题。有人可以帮忙吗? 现在,在比较 col.1 和
我举了一个我正在处理的问题的简短示例。 HTML代码: 1 2 3 CSS 代码: .BB a:hover{ color: #000; } .BB > li:after {
我是一名优秀的程序员,十分优秀!