ws-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From cohei...@apache.org
Subject svn commit: r1040461 [21/28] - in /webservices/wss4j/site: ./ apidocs/ apidocs/org/apache/ws/axis/security/ apidocs/org/apache/ws/axis/security/class-use/ apidocs/org/apache/ws/axis/security/handler/ apidocs/org/apache/ws/axis/security/handler/class-us...
Date Tue, 30 Nov 2010 11:10:41 GMT
Modified: webservices/wss4j/site/xref/org/apache/ws/security/message/WSSecEncryptedKey.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref/org/apache/ws/security/message/WSSecEncryptedKey.html?rev=1040461&r1=1040460&r2=1040461&view=diff
==============================================================================
--- webservices/wss4j/site/xref/org/apache/ws/security/message/WSSecEncryptedKey.html (original)
+++ webservices/wss4j/site/xref/org/apache/ws/security/message/WSSecEncryptedKey.html Tue Nov 30 11:10:26 2010
@@ -106,295 +106,295 @@
 <a name="96" href="#96">96</a>      <strong class="jxr_keyword">protected</strong> String encKeyId = <strong class="jxr_keyword">null</strong>;
 <a name="97" href="#97">97</a>  
 <a name="98" href="#98">98</a>      <em class="jxr_javadoccomment">/**</em>
-<a name="99" href="#99">99</a>  <em class="jxr_javadoccomment">     * BinarySecurityToken to be included in the case where BST_DIRECT_REFERENCE</em>
-<a name="100" href="#100">100</a> <em class="jxr_javadoccomment">     * is used to refer to the asymmetric encryption cert</em>
-<a name="101" href="#101">101</a> <em class="jxr_javadoccomment">     */</em>
-<a name="102" href="#102">102</a>     <strong class="jxr_keyword">protected</strong> <a href="../../../../../org/apache/ws/security/message/token/BinarySecurity.html">BinarySecurity</a> bstToken = <strong class="jxr_keyword">null</strong>;
-<a name="103" href="#103">103</a>     
-<a name="104" href="#104">104</a>     <strong class="jxr_keyword">protected</strong> X509Certificate useThisCert = <strong class="jxr_keyword">null</strong>;
-<a name="105" href="#105">105</a>     
-<a name="106" href="#106">106</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="107" href="#107">107</a> <em class="jxr_javadoccomment">     * Key size in bits</em>
-<a name="108" href="#108">108</a> <em class="jxr_javadoccomment">     * Defaults to 128</em>
-<a name="109" href="#109">109</a> <em class="jxr_javadoccomment">     */</em>
-<a name="110" href="#110">110</a>     <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">int</strong> keySize = 128;
-<a name="111" href="#111">111</a> 
-<a name="112" href="#112">112</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="113" href="#113">113</a> <em class="jxr_javadoccomment">     * Set the user name to get the encryption certificate.</em>
-<a name="114" href="#114">114</a> <em class="jxr_javadoccomment">     * </em>
-<a name="115" href="#115">115</a> <em class="jxr_javadoccomment">     * The public key of this certificate is used, thus no password necessary.</em>
-<a name="116" href="#116">116</a> <em class="jxr_javadoccomment">     * The user name is a keystore alias usually.</em>
-<a name="117" href="#117">117</a> <em class="jxr_javadoccomment">     * </em>
-<a name="118" href="#118">118</a> <em class="jxr_javadoccomment">     * @param user</em>
+<a name="99" href="#99">99</a>  <em class="jxr_javadoccomment">     * Custom token value</em>
+<a name="100" href="#100">100</a> <em class="jxr_javadoccomment">     */</em>
+<a name="101" href="#101">101</a>     <strong class="jxr_keyword">protected</strong> String customEKTokenValueType;
+<a name="102" href="#102">102</a>     
+<a name="103" href="#103">103</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="104" href="#104">104</a> <em class="jxr_javadoccomment">     * Custom token id</em>
+<a name="105" href="#105">105</a> <em class="jxr_javadoccomment">     */</em>
+<a name="106" href="#106">106</a>     <strong class="jxr_keyword">protected</strong> String customEKTokenId;
+<a name="107" href="#107">107</a>     
+<a name="108" href="#108">108</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="109" href="#109">109</a> <em class="jxr_javadoccomment">     * BinarySecurityToken to be included in the case where BST_DIRECT_REFERENCE</em>
+<a name="110" href="#110">110</a> <em class="jxr_javadoccomment">     * is used to refer to the asymmetric encryption cert</em>
+<a name="111" href="#111">111</a> <em class="jxr_javadoccomment">     */</em>
+<a name="112" href="#112">112</a>     <strong class="jxr_keyword">protected</strong> <a href="../../../../../org/apache/ws/security/message/token/BinarySecurity.html">BinarySecurity</a> bstToken = <strong class="jxr_keyword">null</strong>;
+<a name="113" href="#113">113</a>     
+<a name="114" href="#114">114</a>     <strong class="jxr_keyword">protected</strong> X509Certificate useThisCert = <strong class="jxr_keyword">null</strong>;
+<a name="115" href="#115">115</a>     
+<a name="116" href="#116">116</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="117" href="#117">117</a> <em class="jxr_javadoccomment">     * Key size in bits</em>
+<a name="118" href="#118">118</a> <em class="jxr_javadoccomment">     * Defaults to 128</em>
 <a name="119" href="#119">119</a> <em class="jxr_javadoccomment">     */</em>
-<a name="120" href="#120">120</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setUserInfo(String user) {
-<a name="121" href="#121">121</a>         <strong class="jxr_keyword">this</strong>.user = user;
-<a name="122" href="#122">122</a>     }
-<a name="123" href="#123">123</a> 
-<a name="124" href="#124">124</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="125" href="#125">125</a> <em class="jxr_javadoccomment">     * Get the id generated during &lt;code&gt;prepare()&lt;/code&gt;.</em>
-<a name="126" href="#126">126</a> <em class="jxr_javadoccomment">     * </em>
-<a name="127" href="#127">127</a> <em class="jxr_javadoccomment">     * Returns the the value of wsu:Id attribute of the EncryptedKey element.</em>
-<a name="128" href="#128">128</a> <em class="jxr_javadoccomment">     * </em>
-<a name="129" href="#129">129</a> <em class="jxr_javadoccomment">     * @return Return the wsu:Id of this token or null if &lt;code&gt;prepare()&lt;/code&gt;</em>
-<a name="130" href="#130">130</a> <em class="jxr_javadoccomment">     *         was not called before.</em>
-<a name="131" href="#131">131</a> <em class="jxr_javadoccomment">     */</em>
-<a name="132" href="#132">132</a>     <strong class="jxr_keyword">public</strong> String getId() {
-<a name="133" href="#133">133</a>         <strong class="jxr_keyword">return</strong> encKeyId;
-<a name="134" href="#134">134</a>     }
-<a name="135" href="#135">135</a> 
-<a name="136" href="#136">136</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="137" href="#137">137</a> <em class="jxr_javadoccomment">     * Prepare the ephemeralKey and the tokens required to be added to the</em>
-<a name="138" href="#138">138</a> <em class="jxr_javadoccomment">     * security header</em>
-<a name="139" href="#139">139</a> <em class="jxr_javadoccomment">     * </em>
-<a name="140" href="#140">140</a> <em class="jxr_javadoccomment">     * @param doc The SOAP envelope as &lt;code&gt;Document&lt;/code&gt;</em>
-<a name="141" href="#141">141</a> <em class="jxr_javadoccomment">     * @param crypto An instance of the Crypto API to handle keystore and certificates</em>
-<a name="142" href="#142">142</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
-<a name="143" href="#143">143</a> <em class="jxr_javadoccomment">     */</em>
-<a name="144" href="#144">144</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> prepare(Document doc, <a href="../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="120" href="#120">120</a>     <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">int</strong> keySize = 128;
+<a name="121" href="#121">121</a> 
+<a name="122" href="#122">122</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="123" href="#123">123</a> <em class="jxr_javadoccomment">     * Set the user name to get the encryption certificate.</em>
+<a name="124" href="#124">124</a> <em class="jxr_javadoccomment">     * </em>
+<a name="125" href="#125">125</a> <em class="jxr_javadoccomment">     * The public key of this certificate is used, thus no password necessary.</em>
+<a name="126" href="#126">126</a> <em class="jxr_javadoccomment">     * The user name is a keystore alias usually.</em>
+<a name="127" href="#127">127</a> <em class="jxr_javadoccomment">     * </em>
+<a name="128" href="#128">128</a> <em class="jxr_javadoccomment">     * @param user</em>
+<a name="129" href="#129">129</a> <em class="jxr_javadoccomment">     */</em>
+<a name="130" href="#130">130</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setUserInfo(String user) {
+<a name="131" href="#131">131</a>         <strong class="jxr_keyword">this</strong>.user = user;
+<a name="132" href="#132">132</a>     }
+<a name="133" href="#133">133</a> 
+<a name="134" href="#134">134</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="135" href="#135">135</a> <em class="jxr_javadoccomment">     * Get the id generated during &lt;code&gt;prepare()&lt;/code&gt;.</em>
+<a name="136" href="#136">136</a> <em class="jxr_javadoccomment">     * </em>
+<a name="137" href="#137">137</a> <em class="jxr_javadoccomment">     * Returns the the value of wsu:Id attribute of the EncryptedKey element.</em>
+<a name="138" href="#138">138</a> <em class="jxr_javadoccomment">     * </em>
+<a name="139" href="#139">139</a> <em class="jxr_javadoccomment">     * @return Return the wsu:Id of this token or null if &lt;code&gt;prepare()&lt;/code&gt;</em>
+<a name="140" href="#140">140</a> <em class="jxr_javadoccomment">     *         was not called before.</em>
+<a name="141" href="#141">141</a> <em class="jxr_javadoccomment">     */</em>
+<a name="142" href="#142">142</a>     <strong class="jxr_keyword">public</strong> String getId() {
+<a name="143" href="#143">143</a>         <strong class="jxr_keyword">return</strong> encKeyId;
+<a name="144" href="#144">144</a>     }
 <a name="145" href="#145">145</a> 
-<a name="146" href="#146">146</a>         document = doc;
-<a name="147" href="#147">147</a> 
-<a name="148" href="#148">148</a>         <em class="jxr_comment">//</em>
-<a name="149" href="#149">149</a>         <em class="jxr_comment">// Set up the ephemeral key</em>
-<a name="150" href="#150">150</a>         <em class="jxr_comment">//</em>
-<a name="151" href="#151">151</a>         <strong class="jxr_keyword">if</strong> (<strong class="jxr_keyword">this</strong>.ephemeralKey == <strong class="jxr_keyword">null</strong>) {
-<a name="152" href="#152">152</a>             <strong class="jxr_keyword">this</strong>.ephemeralKey = generateEphemeralKey();
-<a name="153" href="#153">153</a>         }
-<a name="154" href="#154">154</a> 
-<a name="155" href="#155">155</a>         <em class="jxr_comment">//</em>
-<a name="156" href="#156">156</a>         <em class="jxr_comment">// Get the certificate that contains the public key for the public key</em>
-<a name="157" href="#157">157</a>         <em class="jxr_comment">// algorithm that will encrypt the generated symmetric (session) key.</em>
+<a name="146" href="#146">146</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="147" href="#147">147</a> <em class="jxr_javadoccomment">     * Prepare the ephemeralKey and the tokens required to be added to the</em>
+<a name="148" href="#148">148</a> <em class="jxr_javadoccomment">     * security header</em>
+<a name="149" href="#149">149</a> <em class="jxr_javadoccomment">     * </em>
+<a name="150" href="#150">150</a> <em class="jxr_javadoccomment">     * @param doc The SOAP envelope as &lt;code&gt;Document&lt;/code&gt;</em>
+<a name="151" href="#151">151</a> <em class="jxr_javadoccomment">     * @param crypto An instance of the Crypto API to handle keystore and certificates</em>
+<a name="152" href="#152">152</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
+<a name="153" href="#153">153</a> <em class="jxr_javadoccomment">     */</em>
+<a name="154" href="#154">154</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> prepare(Document doc, <a href="../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="155" href="#155">155</a> 
+<a name="156" href="#156">156</a>         document = doc;
+<a name="157" href="#157">157</a> 
 <a name="158" href="#158">158</a>         <em class="jxr_comment">//</em>
-<a name="159" href="#159">159</a>         X509Certificate remoteCert = <strong class="jxr_keyword">null</strong>;
-<a name="160" href="#160">160</a>         <strong class="jxr_keyword">if</strong> (useThisCert != <strong class="jxr_keyword">null</strong>) {
-<a name="161" href="#161">161</a>             remoteCert = useThisCert;
-<a name="162" href="#162">162</a>         } <strong class="jxr_keyword">else</strong> {
-<a name="163" href="#163">163</a>             X509Certificate[] certs = crypto.getCertificates(user);
-<a name="164" href="#164">164</a>             <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length &lt;= 0) {
-<a name="165" href="#165">165</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="166" href="#166">166</a>                     WSSecurityException.FAILURE,
-<a name="167" href="#167">167</a>                     <span class="jxr_string">"noUserCertsFound"</span>, 
-<a name="168" href="#168">168</a>                     <strong class="jxr_keyword">new</strong> Object[] {user, <span class="jxr_string">"encryption"</span>}
-<a name="169" href="#169">169</a>                 );
-<a name="170" href="#170">170</a>             }
-<a name="171" href="#171">171</a>             remoteCert = certs[0];
-<a name="172" href="#172">172</a>         }
-<a name="173" href="#173">173</a>         
-<a name="174" href="#174">174</a>         prepareInternal(ephemeralKey, remoteCert, crypto);
-<a name="175" href="#175">175</a>     }
-<a name="176" href="#176">176</a> 
-<a name="177" href="#177">177</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="178" href="#178">178</a> <em class="jxr_javadoccomment">     * Encrypt the symmetric key data and prepare the EncryptedKey element</em>
-<a name="179" href="#179">179</a> <em class="jxr_javadoccomment">     * </em>
-<a name="180" href="#180">180</a> <em class="jxr_javadoccomment">     * This method does the most work for to prepare the EncryptedKey element.</em>
-<a name="181" href="#181">181</a> <em class="jxr_javadoccomment">     * It is also used by the WSSecEncrypt sub-class.</em>
-<a name="182" href="#182">182</a> <em class="jxr_javadoccomment">     * </em>
-<a name="183" href="#183">183</a> <em class="jxr_javadoccomment">     * @param keyBytes The bytes that represent the symmetric key</em>
-<a name="184" href="#184">184</a> <em class="jxr_javadoccomment">     * @param remoteCert The certificate that contains the public key to encrypt the</em>
-<a name="185" href="#185">185</a> <em class="jxr_javadoccomment">     *                   symmetric key data</em>
-<a name="186" href="#186">186</a> <em class="jxr_javadoccomment">     * @param crypto An instance of the Crypto API to handle keystore and certificates</em>
-<a name="187" href="#187">187</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
-<a name="188" href="#188">188</a> <em class="jxr_javadoccomment">     */</em>
-<a name="189" href="#189">189</a>     <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">void</strong> prepareInternal(
-<a name="190" href="#190">190</a>         byte[] keyBytes, 
-<a name="191" href="#191">191</a>         X509Certificate remoteCert,
-<a name="192" href="#192">192</a>         <a href="../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto
-<a name="193" href="#193">193</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
-<a name="194" href="#194">194</a>         String certUri = UUIDGenerator.getUUID();
-<a name="195" href="#195">195</a>         Cipher cipher = WSSecurityUtil.getCipherInstance(keyEncAlgo);
-<a name="196" href="#196">196</a>         <strong class="jxr_keyword">try</strong> {
-<a name="197" href="#197">197</a>             cipher.init(Cipher.ENCRYPT_MODE, remoteCert.getPublicKey());
-<a name="198" href="#198">198</a>         } <strong class="jxr_keyword">catch</strong> (InvalidKeyException e) {
-<a name="199" href="#199">199</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="200" href="#200">200</a>                 WSSecurityException.FAILED_ENCRYPTION, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, e
-<a name="201" href="#201">201</a>             );
-<a name="202" href="#202">202</a>         }
-<a name="203" href="#203">203</a>         <strong class="jxr_keyword">if</strong> (doDebug) {
-<a name="204" href="#204">204</a>             log.debug(
-<a name="205" href="#205">205</a>                 <span class="jxr_string">"cipher blksize: "</span> + cipher.getBlockSize()
-<a name="206" href="#206">206</a>                 + <span class="jxr_string">", symm key length: "</span> + keyBytes.length
-<a name="207" href="#207">207</a>             );
-<a name="208" href="#208">208</a>         }
-<a name="209" href="#209">209</a>         <strong class="jxr_keyword">int</strong> blockSize = cipher.getBlockSize();
-<a name="210" href="#210">210</a>         <strong class="jxr_keyword">if</strong> (blockSize &gt; 0 &amp;&amp; blockSize &lt; keyBytes.length) {
-<a name="211" href="#211">211</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="212" href="#212">212</a>                 WSSecurityException.FAILURE,
-<a name="213" href="#213">213</a>                 <span class="jxr_string">"unsupportedKeyTransp"</span>,
-<a name="214" href="#214">214</a>                 <strong class="jxr_keyword">new</strong> Object[] {<span class="jxr_string">"public key algorithm too weak to encrypt symmetric key"</span>}
-<a name="215" href="#215">215</a>             );
-<a name="216" href="#216">216</a>         }
-<a name="217" href="#217">217</a>         
-<a name="218" href="#218">218</a>         <strong class="jxr_keyword">try</strong> {
-<a name="219" href="#219">219</a>             <strong class="jxr_keyword">this</strong>.encryptedEphemeralKey = cipher.doFinal(keyBytes);
-<a name="220" href="#220">220</a>         } <strong class="jxr_keyword">catch</strong> (IllegalStateException e1) {
+<a name="159" href="#159">159</a>         <em class="jxr_comment">// Set up the ephemeral key</em>
+<a name="160" href="#160">160</a>         <em class="jxr_comment">//</em>
+<a name="161" href="#161">161</a>         <strong class="jxr_keyword">if</strong> (<strong class="jxr_keyword">this</strong>.ephemeralKey == <strong class="jxr_keyword">null</strong>) {
+<a name="162" href="#162">162</a>             <strong class="jxr_keyword">this</strong>.ephemeralKey = generateEphemeralKey();
+<a name="163" href="#163">163</a>         }
+<a name="164" href="#164">164</a> 
+<a name="165" href="#165">165</a>         <em class="jxr_comment">//</em>
+<a name="166" href="#166">166</a>         <em class="jxr_comment">// Get the certificate that contains the public key for the public key</em>
+<a name="167" href="#167">167</a>         <em class="jxr_comment">// algorithm that will encrypt the generated symmetric (session) key.</em>
+<a name="168" href="#168">168</a>         <em class="jxr_comment">//</em>
+<a name="169" href="#169">169</a>         X509Certificate remoteCert = <strong class="jxr_keyword">null</strong>;
+<a name="170" href="#170">170</a>         <strong class="jxr_keyword">if</strong> (useThisCert != <strong class="jxr_keyword">null</strong>) {
+<a name="171" href="#171">171</a>             remoteCert = useThisCert;
+<a name="172" href="#172">172</a>         } <strong class="jxr_keyword">else</strong> {
+<a name="173" href="#173">173</a>             X509Certificate[] certs = crypto.getCertificates(user);
+<a name="174" href="#174">174</a>             <strong class="jxr_keyword">if</strong> (certs == <strong class="jxr_keyword">null</strong> || certs.length &lt;= 0) {
+<a name="175" href="#175">175</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="176" href="#176">176</a>                     WSSecurityException.FAILURE,
+<a name="177" href="#177">177</a>                     <span class="jxr_string">"noUserCertsFound"</span>, 
+<a name="178" href="#178">178</a>                     <strong class="jxr_keyword">new</strong> Object[] {user, <span class="jxr_string">"encryption"</span>}
+<a name="179" href="#179">179</a>                 );
+<a name="180" href="#180">180</a>             }
+<a name="181" href="#181">181</a>             remoteCert = certs[0];
+<a name="182" href="#182">182</a>         }
+<a name="183" href="#183">183</a>         
+<a name="184" href="#184">184</a>         prepareInternal(ephemeralKey, remoteCert, crypto);
+<a name="185" href="#185">185</a>     }
+<a name="186" href="#186">186</a> 
+<a name="187" href="#187">187</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="188" href="#188">188</a> <em class="jxr_javadoccomment">     * Encrypt the symmetric key data and prepare the EncryptedKey element</em>
+<a name="189" href="#189">189</a> <em class="jxr_javadoccomment">     * </em>
+<a name="190" href="#190">190</a> <em class="jxr_javadoccomment">     * This method does the most work for to prepare the EncryptedKey element.</em>
+<a name="191" href="#191">191</a> <em class="jxr_javadoccomment">     * It is also used by the WSSecEncrypt sub-class.</em>
+<a name="192" href="#192">192</a> <em class="jxr_javadoccomment">     * </em>
+<a name="193" href="#193">193</a> <em class="jxr_javadoccomment">     * @param keyBytes The bytes that represent the symmetric key</em>
+<a name="194" href="#194">194</a> <em class="jxr_javadoccomment">     * @param remoteCert The certificate that contains the public key to encrypt the</em>
+<a name="195" href="#195">195</a> <em class="jxr_javadoccomment">     *                   symmetric key data</em>
+<a name="196" href="#196">196</a> <em class="jxr_javadoccomment">     * @param crypto An instance of the Crypto API to handle keystore and certificates</em>
+<a name="197" href="#197">197</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
+<a name="198" href="#198">198</a> <em class="jxr_javadoccomment">     */</em>
+<a name="199" href="#199">199</a>     <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">void</strong> prepareInternal(
+<a name="200" href="#200">200</a>         byte[] keyBytes, 
+<a name="201" href="#201">201</a>         X509Certificate remoteCert,
+<a name="202" href="#202">202</a>         <a href="../../../../../org/apache/ws/security/components/crypto/Crypto.html">Crypto</a> crypto
+<a name="203" href="#203">203</a>     ) <strong class="jxr_keyword">throws</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a> {
+<a name="204" href="#204">204</a>         String certUri = UUIDGenerator.getUUID();
+<a name="205" href="#205">205</a>         Cipher cipher = WSSecurityUtil.getCipherInstance(keyEncAlgo);
+<a name="206" href="#206">206</a>         <strong class="jxr_keyword">try</strong> {
+<a name="207" href="#207">207</a>             cipher.init(Cipher.ENCRYPT_MODE, remoteCert.getPublicKey());
+<a name="208" href="#208">208</a>         } <strong class="jxr_keyword">catch</strong> (InvalidKeyException e) {
+<a name="209" href="#209">209</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="210" href="#210">210</a>                 WSSecurityException.FAILED_ENCRYPTION, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, e
+<a name="211" href="#211">211</a>             );
+<a name="212" href="#212">212</a>         }
+<a name="213" href="#213">213</a>         <strong class="jxr_keyword">if</strong> (doDebug) {
+<a name="214" href="#214">214</a>             log.debug(
+<a name="215" href="#215">215</a>                 <span class="jxr_string">"cipher blksize: "</span> + cipher.getBlockSize()
+<a name="216" href="#216">216</a>                 + <span class="jxr_string">", symm key length: "</span> + keyBytes.length
+<a name="217" href="#217">217</a>             );
+<a name="218" href="#218">218</a>         }
+<a name="219" href="#219">219</a>         <strong class="jxr_keyword">int</strong> blockSize = cipher.getBlockSize();
+<a name="220" href="#220">220</a>         <strong class="jxr_keyword">if</strong> (blockSize &gt; 0 &amp;&amp; blockSize &lt; keyBytes.length) {
 <a name="221" href="#221">221</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="222" href="#222">222</a>                 WSSecurityException.FAILED_ENCRYPTION, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, e1
-<a name="223" href="#223">223</a>             );
-<a name="224" href="#224">224</a>         } <strong class="jxr_keyword">catch</strong> (IllegalBlockSizeException e1) {
-<a name="225" href="#225">225</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="226" href="#226">226</a>                 WSSecurityException.FAILED_ENCRYPTION, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, e1
-<a name="227" href="#227">227</a>             );
-<a name="228" href="#228">228</a>         } <strong class="jxr_keyword">catch</strong> (BadPaddingException e1) {
-<a name="229" href="#229">229</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
-<a name="230" href="#230">230</a>                 WSSecurityException.FAILED_ENCRYPTION, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, e1
-<a name="231" href="#231">231</a>             );
-<a name="232" href="#232">232</a>         }
-<a name="233" href="#233">233</a>         Text keyText = 
-<a name="234" href="#234">234</a>             WSSecurityUtil.createBase64EncodedTextNode(document, <strong class="jxr_keyword">this</strong>.encryptedEphemeralKey);
-<a name="235" href="#235">235</a> 
-<a name="236" href="#236">236</a>         <em class="jxr_comment">//</em>
-<a name="237" href="#237">237</a>         <em class="jxr_comment">// Now we need to setup the EncryptedKey header block 1) create a</em>
-<a name="238" href="#238">238</a>         <em class="jxr_comment">// EncryptedKey element and set a wsu:Id for it 2) Generate ds:KeyInfo</em>
-<a name="239" href="#239">239</a>         <em class="jxr_comment">// element, this wraps the wsse:SecurityTokenReference 3) Create and set</em>
-<a name="240" href="#240">240</a>         <em class="jxr_comment">// up the SecurityTokenReference according to the keyIdentifier parameter</em>
-<a name="241" href="#241">241</a>         <em class="jxr_comment">// 4) Create the CipherValue element structure and insert the encrypted</em>
-<a name="242" href="#242">242</a>         <em class="jxr_comment">// session key</em>
-<a name="243" href="#243">243</a>         <em class="jxr_comment">//</em>
-<a name="244" href="#244">244</a>         encryptedKeyElement = createEncryptedKey(document, keyEncAlgo);
-<a name="245" href="#245">245</a>         <strong class="jxr_keyword">if</strong>(<strong class="jxr_keyword">this</strong>.encKeyId == <strong class="jxr_keyword">null</strong> || <span class="jxr_string">""</span>.equals(<strong class="jxr_keyword">this</strong>.encKeyId)) {
-<a name="246" href="#246">246</a>             <strong class="jxr_keyword">this</strong>.encKeyId = <span class="jxr_string">"EncKeyId-"</span> + UUIDGenerator.getUUID();
-<a name="247" href="#247">247</a>         }
-<a name="248" href="#248">248</a>         encryptedKeyElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"Id"</span>, <strong class="jxr_keyword">this</strong>.encKeyId);
-<a name="249" href="#249">249</a> 
-<a name="250" href="#250">250</a>         KeyInfo keyInfo = <strong class="jxr_keyword">new</strong> KeyInfo(document);
-<a name="251" href="#251">251</a> 
-<a name="252" href="#252">252</a>         <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secToken = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(document);
-<a name="253" href="#253">253</a> 
-<a name="254" href="#254">254</a>         <strong class="jxr_keyword">switch</strong> (keyIdentifierType) {
-<a name="255" href="#255">255</a>         <strong class="jxr_keyword">case</strong> WSConstants.X509_KEY_IDENTIFIER:
-<a name="256" href="#256">256</a>             secToken.setKeyIdentifier(remoteCert);
-<a name="257" href="#257">257</a>             <strong class="jxr_keyword">break</strong>;
-<a name="258" href="#258">258</a> 
-<a name="259" href="#259">259</a>         <strong class="jxr_keyword">case</strong> WSConstants.SKI_KEY_IDENTIFIER:
-<a name="260" href="#260">260</a>             secToken.setKeyIdentifierSKI(remoteCert, crypto);
-<a name="261" href="#261">261</a>             <strong class="jxr_keyword">break</strong>;
-<a name="262" href="#262">262</a> 
-<a name="263" href="#263">263</a>         <strong class="jxr_keyword">case</strong> WSConstants.THUMBPRINT_IDENTIFIER:
-<a name="264" href="#264">264</a>             secToken.setKeyIdentifierThumb(remoteCert);
-<a name="265" href="#265">265</a>             <strong class="jxr_keyword">break</strong>;
-<a name="266" href="#266">266</a>             
-<a name="267" href="#267">267</a>         <strong class="jxr_keyword">case</strong> WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER:
-<a name="268" href="#268">268</a>             <em class="jxr_comment">//</em>
-<a name="269" href="#269">269</a>             <em class="jxr_comment">// This identifier is not applicable for this case, so fall back to</em>
-<a name="270" href="#270">270</a>             <em class="jxr_comment">// ThumbprintRSA.</em>
-<a name="271" href="#271">271</a>             <em class="jxr_comment">//</em>
-<a name="272" href="#272">272</a>             secToken.setKeyIdentifierThumb(remoteCert);
-<a name="273" href="#273">273</a>             <strong class="jxr_keyword">break</strong>;
-<a name="274" href="#274">274</a> 
-<a name="275" href="#275">275</a>         <strong class="jxr_keyword">case</strong> WSConstants.ISSUER_SERIAL:
-<a name="276" href="#276">276</a>             XMLX509IssuerSerial data = <strong class="jxr_keyword">new</strong> XMLX509IssuerSerial(document, remoteCert);
-<a name="277" href="#277">277</a>             X509Data x509Data = <strong class="jxr_keyword">new</strong> X509Data(document);
-<a name="278" href="#278">278</a>             x509Data.add(data);
-<a name="279" href="#279">279</a>             secToken.setX509IssuerSerial(x509Data);
-<a name="280" href="#280">280</a>             <strong class="jxr_keyword">break</strong>;
-<a name="281" href="#281">281</a> 
-<a name="282" href="#282">282</a>         <strong class="jxr_keyword">case</strong> WSConstants.BST_DIRECT_REFERENCE:
-<a name="283" href="#283">283</a>             <a href="../../../../../org/apache/ws/security/message/token/Reference.html">Reference</a> ref = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/Reference.html">Reference</a>(document);
-<a name="284" href="#284">284</a>             ref.setURI(<span class="jxr_string">"#"</span> + certUri);
-<a name="285" href="#285">285</a>             bstToken = <strong class="jxr_keyword">new</strong> X509Security(document);
-<a name="286" href="#286">286</a>             ((X509Security) bstToken).setX509Certificate(remoteCert);
-<a name="287" href="#287">287</a>             bstToken.setID(certUri);
-<a name="288" href="#288">288</a>             ref.setValueType(bstToken.getValueType());
-<a name="289" href="#289">289</a>             secToken.setReference(ref);
+<a name="222" href="#222">222</a>                 WSSecurityException.FAILURE,
+<a name="223" href="#223">223</a>                 <span class="jxr_string">"unsupportedKeyTransp"</span>,
+<a name="224" href="#224">224</a>                 <strong class="jxr_keyword">new</strong> Object[] {<span class="jxr_string">"public key algorithm too weak to encrypt symmetric key"</span>}
+<a name="225" href="#225">225</a>             );
+<a name="226" href="#226">226</a>         }
+<a name="227" href="#227">227</a>         
+<a name="228" href="#228">228</a>         <strong class="jxr_keyword">try</strong> {
+<a name="229" href="#229">229</a>             <strong class="jxr_keyword">this</strong>.encryptedEphemeralKey = cipher.doFinal(keyBytes);
+<a name="230" href="#230">230</a>         } <strong class="jxr_keyword">catch</strong> (IllegalStateException e1) {
+<a name="231" href="#231">231</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="232" href="#232">232</a>                 WSSecurityException.FAILED_ENCRYPTION, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, e1
+<a name="233" href="#233">233</a>             );
+<a name="234" href="#234">234</a>         } <strong class="jxr_keyword">catch</strong> (IllegalBlockSizeException e1) {
+<a name="235" href="#235">235</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="236" href="#236">236</a>                 WSSecurityException.FAILED_ENCRYPTION, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, e1
+<a name="237" href="#237">237</a>             );
+<a name="238" href="#238">238</a>         } <strong class="jxr_keyword">catch</strong> (BadPaddingException e1) {
+<a name="239" href="#239">239</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(
+<a name="240" href="#240">240</a>                 WSSecurityException.FAILED_ENCRYPTION, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, e1
+<a name="241" href="#241">241</a>             );
+<a name="242" href="#242">242</a>         }
+<a name="243" href="#243">243</a>         Text keyText = 
+<a name="244" href="#244">244</a>             WSSecurityUtil.createBase64EncodedTextNode(document, <strong class="jxr_keyword">this</strong>.encryptedEphemeralKey);
+<a name="245" href="#245">245</a> 
+<a name="246" href="#246">246</a>         <em class="jxr_comment">//</em>
+<a name="247" href="#247">247</a>         <em class="jxr_comment">// Now we need to setup the EncryptedKey header block 1) create a</em>
+<a name="248" href="#248">248</a>         <em class="jxr_comment">// EncryptedKey element and set a wsu:Id for it 2) Generate ds:KeyInfo</em>
+<a name="249" href="#249">249</a>         <em class="jxr_comment">// element, this wraps the wsse:SecurityTokenReference 3) Create and set</em>
+<a name="250" href="#250">250</a>         <em class="jxr_comment">// up the SecurityTokenReference according to the keyIdentifier parameter</em>
+<a name="251" href="#251">251</a>         <em class="jxr_comment">// 4) Create the CipherValue element structure and insert the encrypted</em>
+<a name="252" href="#252">252</a>         <em class="jxr_comment">// session key</em>
+<a name="253" href="#253">253</a>         <em class="jxr_comment">//</em>
+<a name="254" href="#254">254</a>         encryptedKeyElement = createEncryptedKey(document, keyEncAlgo);
+<a name="255" href="#255">255</a>         <strong class="jxr_keyword">if</strong>(<strong class="jxr_keyword">this</strong>.encKeyId == <strong class="jxr_keyword">null</strong> || <span class="jxr_string">""</span>.equals(<strong class="jxr_keyword">this</strong>.encKeyId)) {
+<a name="256" href="#256">256</a>             <strong class="jxr_keyword">this</strong>.encKeyId = <span class="jxr_string">"EncKeyId-"</span> + UUIDGenerator.getUUID();
+<a name="257" href="#257">257</a>         }
+<a name="258" href="#258">258</a>         encryptedKeyElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"Id"</span>, <strong class="jxr_keyword">this</strong>.encKeyId);
+<a name="259" href="#259">259</a> 
+<a name="260" href="#260">260</a>         KeyInfo keyInfo = <strong class="jxr_keyword">new</strong> KeyInfo(document);
+<a name="261" href="#261">261</a> 
+<a name="262" href="#262">262</a>         <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a> secToken = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/SecurityTokenReference.html">SecurityTokenReference</a>(document);
+<a name="263" href="#263">263</a> 
+<a name="264" href="#264">264</a>         <strong class="jxr_keyword">switch</strong> (keyIdentifierType) {
+<a name="265" href="#265">265</a>         <strong class="jxr_keyword">case</strong> WSConstants.X509_KEY_IDENTIFIER:
+<a name="266" href="#266">266</a>             secToken.setKeyIdentifier(remoteCert);
+<a name="267" href="#267">267</a>             <strong class="jxr_keyword">break</strong>;
+<a name="268" href="#268">268</a> 
+<a name="269" href="#269">269</a>         <strong class="jxr_keyword">case</strong> WSConstants.SKI_KEY_IDENTIFIER:
+<a name="270" href="#270">270</a>             secToken.setKeyIdentifierSKI(remoteCert, crypto);
+<a name="271" href="#271">271</a>             <strong class="jxr_keyword">break</strong>;
+<a name="272" href="#272">272</a> 
+<a name="273" href="#273">273</a>         <strong class="jxr_keyword">case</strong> WSConstants.THUMBPRINT_IDENTIFIER:
+<a name="274" href="#274">274</a>             secToken.setKeyIdentifierThumb(remoteCert);
+<a name="275" href="#275">275</a>             <strong class="jxr_keyword">break</strong>;
+<a name="276" href="#276">276</a>             
+<a name="277" href="#277">277</a>         <strong class="jxr_keyword">case</strong> WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER:
+<a name="278" href="#278">278</a>             <em class="jxr_comment">//</em>
+<a name="279" href="#279">279</a>             <em class="jxr_comment">// This identifier is not applicable for this case, so fall back to</em>
+<a name="280" href="#280">280</a>             <em class="jxr_comment">// ThumbprintRSA.</em>
+<a name="281" href="#281">281</a>             <em class="jxr_comment">//</em>
+<a name="282" href="#282">282</a>             secToken.setKeyIdentifierThumb(remoteCert);
+<a name="283" href="#283">283</a>             <strong class="jxr_keyword">break</strong>;
+<a name="284" href="#284">284</a> 
+<a name="285" href="#285">285</a>         <strong class="jxr_keyword">case</strong> WSConstants.ISSUER_SERIAL:
+<a name="286" href="#286">286</a>             XMLX509IssuerSerial data = <strong class="jxr_keyword">new</strong> XMLX509IssuerSerial(document, remoteCert);
+<a name="287" href="#287">287</a>             X509Data x509Data = <strong class="jxr_keyword">new</strong> X509Data(document);
+<a name="288" href="#288">288</a>             x509Data.add(data);
+<a name="289" href="#289">289</a>             secToken.setX509IssuerSerial(x509Data);
 <a name="290" href="#290">290</a>             <strong class="jxr_keyword">break</strong>;
 <a name="291" href="#291">291</a> 
-<a name="292" href="#292">292</a>         <strong class="jxr_keyword">default</strong>:
-<a name="293" href="#293">293</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILURE, <span class="jxr_string">"unsupportedKeyId"</span>);
-<a name="294" href="#294">294</a>         }
-<a name="295" href="#295">295</a>         keyInfo.addUnknownElement(secToken.getElement());
-<a name="296" href="#296">296</a>         Element keyInfoElement = keyInfo.getElement();
-<a name="297" href="#297">297</a>         keyInfoElement.setAttributeNS(
-<a name="298" href="#298">298</a>             WSConstants.XMLNS_NS, <span class="jxr_string">"xmlns:"</span> + WSConstants.SIG_PREFIX, WSConstants.SIG_NS
-<a name="299" href="#299">299</a>         );
-<a name="300" href="#300">300</a>         encryptedKeyElement.appendChild(keyInfoElement);
-<a name="301" href="#301">301</a> 
-<a name="302" href="#302">302</a>         Element xencCipherValue = createCipherValue(document, encryptedKeyElement);
-<a name="303" href="#303">303</a>         xencCipherValue.appendChild(keyText);
-<a name="304" href="#304">304</a> 
-<a name="305" href="#305">305</a>         envelope = document.getDocumentElement();
-<a name="306" href="#306">306</a>         envelope.setAttributeNS(
-<a name="307" href="#307">307</a>             WSConstants.XMLNS_NS, <span class="jxr_string">"xmlns:"</span> + WSConstants.ENC_PREFIX, WSConstants.ENC_NS
-<a name="308" href="#308">308</a>         );
-<a name="309" href="#309">309</a>     }
-<a name="310" href="#310">310</a> 
-<a name="311" href="#311">311</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="312" href="#312">312</a> <em class="jxr_javadoccomment">     * Create an ephemeral key</em>
-<a name="313" href="#313">313</a> <em class="jxr_javadoccomment">     * </em>
-<a name="314" href="#314">314</a> <em class="jxr_javadoccomment">     * @return an ephemeral key</em>
-<a name="315" href="#315">315</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
-<a name="316" href="#316">316</a> <em class="jxr_javadoccomment">     */</em>
-<a name="317" href="#317">317</a>     <strong class="jxr_keyword">protected</strong> byte[] generateEphemeralKey() <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="318" href="#318">318</a>         <strong class="jxr_keyword">try</strong> {     
-<a name="319" href="#319">319</a>             <strong class="jxr_keyword">final</strong> SecureRandom r = WSSecurityUtil.resolveSecureRandom();
-<a name="320" href="#320">320</a>             <strong class="jxr_keyword">if</strong> (r == <strong class="jxr_keyword">null</strong>) {
-<a name="321" href="#321">321</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(<span class="jxr_string">"Random generator is not initialzed."</span>);
-<a name="322" href="#322">322</a>             }
-<a name="323" href="#323">323</a>             byte[] temp = <strong class="jxr_keyword">new</strong> byte[<strong class="jxr_keyword">this</strong>.keySize / 8];
-<a name="324" href="#324">324</a>             r.nextBytes(temp);
-<a name="325" href="#325">325</a>             <strong class="jxr_keyword">return</strong> temp;
-<a name="326" href="#326">326</a>         } <strong class="jxr_keyword">catch</strong> (Exception e) {
-<a name="327" href="#327">327</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(<span class="jxr_string">"Error in creating the ephemeral key"</span>, e);
-<a name="328" href="#328">328</a>         }
-<a name="329" href="#329">329</a>     }
-<a name="330" href="#330">330</a> 
-<a name="331" href="#331">331</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="332" href="#332">332</a> <em class="jxr_javadoccomment">     * Create DOM subtree for &lt;code&gt;xenc:EncryptedKey&lt;/code&gt;</em>
-<a name="333" href="#333">333</a> <em class="jxr_javadoccomment">     * </em>
-<a name="334" href="#334">334</a> <em class="jxr_javadoccomment">     * @param doc the SOAP envelope parent document</em>
-<a name="335" href="#335">335</a> <em class="jxr_javadoccomment">     * @param keyTransportAlgo specifies which algorithm to use to encrypt the symmetric key</em>
-<a name="336" href="#336">336</a> <em class="jxr_javadoccomment">     * @return an &lt;code&gt;xenc:EncryptedKey&lt;/code&gt; element</em>
-<a name="337" href="#337">337</a> <em class="jxr_javadoccomment">     */</em>
-<a name="338" href="#338">338</a>     <strong class="jxr_keyword">protected</strong> Element createEncryptedKey(Document doc, String keyTransportAlgo) {
-<a name="339" href="#339">339</a>         Element encryptedKey = 
-<a name="340" href="#340">340</a>             doc.createElementNS(WSConstants.ENC_NS, WSConstants.ENC_PREFIX + <span class="jxr_string">":EncryptedKey"</span>);
-<a name="341" href="#341">341</a> 
-<a name="342" href="#342">342</a>         WSSecurityUtil.setNamespace(encryptedKey, WSConstants.ENC_NS, WSConstants.ENC_PREFIX);
-<a name="343" href="#343">343</a>         Element encryptionMethod = 
-<a name="344" href="#344">344</a>             doc.createElementNS(WSConstants.ENC_NS, WSConstants.ENC_PREFIX + <span class="jxr_string">":EncryptionMethod"</span>);
-<a name="345" href="#345">345</a>         encryptionMethod.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"Algorithm"</span>, keyTransportAlgo);
-<a name="346" href="#346">346</a>         encryptedKey.appendChild(encryptionMethod);
-<a name="347" href="#347">347</a>         <strong class="jxr_keyword">return</strong> encryptedKey;
-<a name="348" href="#348">348</a>     }
-<a name="349" href="#349">349</a>     
-<a name="350" href="#350">350</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="351" href="#351">351</a> <em class="jxr_javadoccomment">     * Create DOM subtree for &lt;code&gt;xenc:EncryptedKey&lt;/code&gt;</em>
-<a name="352" href="#352">352</a> <em class="jxr_javadoccomment">     * </em>
-<a name="353" href="#353">353</a> <em class="jxr_javadoccomment">     * @param doc the SOAP envelope parent document</em>
-<a name="354" href="#354">354</a> <em class="jxr_javadoccomment">     * @param keyTransportAlgo specifies which algorithm to use to encrypt the symmetric key</em>
-<a name="355" href="#355">355</a> <em class="jxr_javadoccomment">     * @return an &lt;code&gt;xenc:EncryptedKey&lt;/code&gt; element</em>
-<a name="356" href="#356">356</a> <em class="jxr_javadoccomment">     * @deprecated use createEncryptedKey(Document doc, String keyTransportAlgo) instead</em>
-<a name="357" href="#357">357</a> <em class="jxr_javadoccomment">     */</em>
-<a name="358" href="#358">358</a>     <strong class="jxr_keyword">protected</strong> Element createEnrcyptedKey(Document doc, String keyTransportAlgo) {
-<a name="359" href="#359">359</a>         <strong class="jxr_keyword">return</strong> createEncryptedKey(doc, keyTransportAlgo);
-<a name="360" href="#360">360</a>     }
-<a name="361" href="#361">361</a> 
-<a name="362" href="#362">362</a>     <strong class="jxr_keyword">protected</strong> Element createCipherValue(Document doc, Element encryptedKey) {
-<a name="363" href="#363">363</a>         Element cipherData = 
-<a name="364" href="#364">364</a>             doc.createElementNS(WSConstants.ENC_NS, WSConstants.ENC_PREFIX + <span class="jxr_string">":CipherData"</span>);
-<a name="365" href="#365">365</a>         Element cipherValue = 
-<a name="366" href="#366">366</a>             doc.createElementNS(WSConstants.ENC_NS, WSConstants.ENC_PREFIX + <span class="jxr_string">":CipherValue"</span>);
-<a name="367" href="#367">367</a>         cipherData.appendChild(cipherValue);
-<a name="368" href="#368">368</a>         encryptedKey.appendChild(cipherData);
-<a name="369" href="#369">369</a>         <strong class="jxr_keyword">return</strong> cipherValue;
-<a name="370" href="#370">370</a>     }
-<a name="371" href="#371">371</a> 
-<a name="372" href="#372">372</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="373" href="#373">373</a> <em class="jxr_javadoccomment">     * Prepend the EncryptedKey element to the elements already in the Security</em>
-<a name="374" href="#374">374</a> <em class="jxr_javadoccomment">     * header.</em>
-<a name="375" href="#375">375</a> <em class="jxr_javadoccomment">     * </em>
-<a name="376" href="#376">376</a> <em class="jxr_javadoccomment">     * The method can be called any time after &lt;code&gt;prepare()&lt;/code&gt;. This</em>
-<a name="377" href="#377">377</a> <em class="jxr_javadoccomment">     * allows to insert the EncryptedKey element at any position in the Security</em>
-<a name="378" href="#378">378</a> <em class="jxr_javadoccomment">     * header.</em>
-<a name="379" href="#379">379</a> <em class="jxr_javadoccomment">     * </em>
-<a name="380" href="#380">380</a> <em class="jxr_javadoccomment">     * @param secHeader The security header that holds the Signature element.</em>
-<a name="381" href="#381">381</a> <em class="jxr_javadoccomment">     */</em>
-<a name="382" href="#382">382</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> prependToHeader(<a href="../../../../../org/apache/ws/security/message/WSSecHeader.html">WSSecHeader</a> secHeader) {
-<a name="383" href="#383">383</a>         WSSecurityUtil.prependChildElement(secHeader.getSecurityHeader(), encryptedKeyElement);
+<a name="292" href="#292">292</a>         <strong class="jxr_keyword">case</strong> WSConstants.BST_DIRECT_REFERENCE:
+<a name="293" href="#293">293</a>             <a href="../../../../../org/apache/ws/security/message/token/Reference.html">Reference</a> ref = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/message/token/Reference.html">Reference</a>(document);
+<a name="294" href="#294">294</a>             ref.setURI(<span class="jxr_string">"#"</span> + certUri);
+<a name="295" href="#295">295</a>             bstToken = <strong class="jxr_keyword">new</strong> X509Security(document);
+<a name="296" href="#296">296</a>             ((X509Security) bstToken).setX509Certificate(remoteCert);
+<a name="297" href="#297">297</a>             bstToken.setID(certUri);
+<a name="298" href="#298">298</a>             ref.setValueType(bstToken.getValueType());
+<a name="299" href="#299">299</a>             secToken.setReference(ref);
+<a name="300" href="#300">300</a>             <strong class="jxr_keyword">break</strong>;
+<a name="301" href="#301">301</a>             
+<a name="302" href="#302">302</a>         <strong class="jxr_keyword">case</strong> WSConstants.CUSTOM_KEY_IDENTIFIER:
+<a name="303" href="#303">303</a>             secToken.setKeyIdentifier(customEKTokenValueType, customEKTokenId);
+<a name="304" href="#304">304</a>             <strong class="jxr_keyword">break</strong>;           
+<a name="305" href="#305">305</a> 
+<a name="306" href="#306">306</a>         <strong class="jxr_keyword">default</strong>:
+<a name="307" href="#307">307</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(WSSecurityException.FAILURE, <span class="jxr_string">"unsupportedKeyId"</span>);
+<a name="308" href="#308">308</a>         }
+<a name="309" href="#309">309</a>         keyInfo.addUnknownElement(secToken.getElement());
+<a name="310" href="#310">310</a>         Element keyInfoElement = keyInfo.getElement();
+<a name="311" href="#311">311</a>         keyInfoElement.setAttributeNS(
+<a name="312" href="#312">312</a>             WSConstants.XMLNS_NS, <span class="jxr_string">"xmlns:"</span> + WSConstants.SIG_PREFIX, WSConstants.SIG_NS
+<a name="313" href="#313">313</a>         );
+<a name="314" href="#314">314</a>         encryptedKeyElement.appendChild(keyInfoElement);
+<a name="315" href="#315">315</a> 
+<a name="316" href="#316">316</a>         Element xencCipherValue = createCipherValue(document, encryptedKeyElement);
+<a name="317" href="#317">317</a>         xencCipherValue.appendChild(keyText);
+<a name="318" href="#318">318</a> 
+<a name="319" href="#319">319</a>         envelope = document.getDocumentElement();
+<a name="320" href="#320">320</a>         envelope.setAttributeNS(
+<a name="321" href="#321">321</a>             WSConstants.XMLNS_NS, <span class="jxr_string">"xmlns:"</span> + WSConstants.ENC_PREFIX, WSConstants.ENC_NS
+<a name="322" href="#322">322</a>         );
+<a name="323" href="#323">323</a>     }
+<a name="324" href="#324">324</a> 
+<a name="325" href="#325">325</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="326" href="#326">326</a> <em class="jxr_javadoccomment">     * Create an ephemeral key</em>
+<a name="327" href="#327">327</a> <em class="jxr_javadoccomment">     * </em>
+<a name="328" href="#328">328</a> <em class="jxr_javadoccomment">     * @return an ephemeral key</em>
+<a name="329" href="#329">329</a> <em class="jxr_javadoccomment">     * @throws WSSecurityException</em>
+<a name="330" href="#330">330</a> <em class="jxr_javadoccomment">     */</em>
+<a name="331" href="#331">331</a>     <strong class="jxr_keyword">protected</strong> byte[] generateEphemeralKey() <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="332" href="#332">332</a>         <strong class="jxr_keyword">try</strong> {     
+<a name="333" href="#333">333</a>             <strong class="jxr_keyword">final</strong> SecureRandom r = WSSecurityUtil.resolveSecureRandom();
+<a name="334" href="#334">334</a>             <strong class="jxr_keyword">if</strong> (r == <strong class="jxr_keyword">null</strong>) {
+<a name="335" href="#335">335</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(<span class="jxr_string">"Random generator is not initialzed."</span>);
+<a name="336" href="#336">336</a>             }
+<a name="337" href="#337">337</a>             byte[] temp = <strong class="jxr_keyword">new</strong> byte[<strong class="jxr_keyword">this</strong>.keySize / 8];
+<a name="338" href="#338">338</a>             r.nextBytes(temp);
+<a name="339" href="#339">339</a>             <strong class="jxr_keyword">return</strong> temp;
+<a name="340" href="#340">340</a>         } <strong class="jxr_keyword">catch</strong> (Exception e) {
+<a name="341" href="#341">341</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(<span class="jxr_string">"Error in creating the ephemeral key"</span>, e);
+<a name="342" href="#342">342</a>         }
+<a name="343" href="#343">343</a>     }
+<a name="344" href="#344">344</a> 
+<a name="345" href="#345">345</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="346" href="#346">346</a> <em class="jxr_javadoccomment">     * Create DOM subtree for &lt;code&gt;xenc:EncryptedKey&lt;/code&gt;</em>
+<a name="347" href="#347">347</a> <em class="jxr_javadoccomment">     * </em>
+<a name="348" href="#348">348</a> <em class="jxr_javadoccomment">     * @param doc the SOAP envelope parent document</em>
+<a name="349" href="#349">349</a> <em class="jxr_javadoccomment">     * @param keyTransportAlgo specifies which algorithm to use to encrypt the symmetric key</em>
+<a name="350" href="#350">350</a> <em class="jxr_javadoccomment">     * @return an &lt;code&gt;xenc:EncryptedKey&lt;/code&gt; element</em>
+<a name="351" href="#351">351</a> <em class="jxr_javadoccomment">     */</em>
+<a name="352" href="#352">352</a>     <strong class="jxr_keyword">protected</strong> Element createEncryptedKey(Document doc, String keyTransportAlgo) {
+<a name="353" href="#353">353</a>         Element encryptedKey = 
+<a name="354" href="#354">354</a>             doc.createElementNS(WSConstants.ENC_NS, WSConstants.ENC_PREFIX + <span class="jxr_string">":EncryptedKey"</span>);
+<a name="355" href="#355">355</a> 
+<a name="356" href="#356">356</a>         WSSecurityUtil.setNamespace(encryptedKey, WSConstants.ENC_NS, WSConstants.ENC_PREFIX);
+<a name="357" href="#357">357</a>         Element encryptionMethod = 
+<a name="358" href="#358">358</a>             doc.createElementNS(WSConstants.ENC_NS, WSConstants.ENC_PREFIX + <span class="jxr_string">":EncryptionMethod"</span>);
+<a name="359" href="#359">359</a>         encryptionMethod.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"Algorithm"</span>, keyTransportAlgo);
+<a name="360" href="#360">360</a>         encryptedKey.appendChild(encryptionMethod);
+<a name="361" href="#361">361</a>         <strong class="jxr_keyword">return</strong> encryptedKey;
+<a name="362" href="#362">362</a>     }
+<a name="363" href="#363">363</a>     
+<a name="364" href="#364">364</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="365" href="#365">365</a> <em class="jxr_javadoccomment">     * Create DOM subtree for &lt;code&gt;xenc:EncryptedKey&lt;/code&gt;</em>
+<a name="366" href="#366">366</a> <em class="jxr_javadoccomment">     * </em>
+<a name="367" href="#367">367</a> <em class="jxr_javadoccomment">     * @param doc the SOAP envelope parent document</em>
+<a name="368" href="#368">368</a> <em class="jxr_javadoccomment">     * @param keyTransportAlgo specifies which algorithm to use to encrypt the symmetric key</em>
+<a name="369" href="#369">369</a> <em class="jxr_javadoccomment">     * @return an &lt;code&gt;xenc:EncryptedKey&lt;/code&gt; element</em>
+<a name="370" href="#370">370</a> <em class="jxr_javadoccomment">     * @deprecated use createEncryptedKey(Document doc, String keyTransportAlgo) instead</em>
+<a name="371" href="#371">371</a> <em class="jxr_javadoccomment">     */</em>
+<a name="372" href="#372">372</a>     <strong class="jxr_keyword">protected</strong> Element createEnrcyptedKey(Document doc, String keyTransportAlgo) {
+<a name="373" href="#373">373</a>         <strong class="jxr_keyword">return</strong> createEncryptedKey(doc, keyTransportAlgo);
+<a name="374" href="#374">374</a>     }
+<a name="375" href="#375">375</a> 
+<a name="376" href="#376">376</a>     <strong class="jxr_keyword">protected</strong> Element createCipherValue(Document doc, Element encryptedKey) {
+<a name="377" href="#377">377</a>         Element cipherData = 
+<a name="378" href="#378">378</a>             doc.createElementNS(WSConstants.ENC_NS, WSConstants.ENC_PREFIX + <span class="jxr_string">":CipherData"</span>);
+<a name="379" href="#379">379</a>         Element cipherValue = 
+<a name="380" href="#380">380</a>             doc.createElementNS(WSConstants.ENC_NS, WSConstants.ENC_PREFIX + <span class="jxr_string">":CipherValue"</span>);
+<a name="381" href="#381">381</a>         cipherData.appendChild(cipherValue);
+<a name="382" href="#382">382</a>         encryptedKey.appendChild(cipherData);
+<a name="383" href="#383">383</a>         <strong class="jxr_keyword">return</strong> cipherValue;
 <a name="384" href="#384">384</a>     }
 <a name="385" href="#385">385</a> 
 <a name="386" href="#386">386</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="387" href="#387">387</a> <em class="jxr_javadoccomment">     * Append the EncryptedKey element to the elements already in the Security</em>
+<a name="387" href="#387">387</a> <em class="jxr_javadoccomment">     * Prepend the EncryptedKey element to the elements already in the Security</em>
 <a name="388" href="#388">388</a> <em class="jxr_javadoccomment">     * header.</em>
 <a name="389" href="#389">389</a> <em class="jxr_javadoccomment">     * </em>
 <a name="390" href="#390">390</a> <em class="jxr_javadoccomment">     * The method can be called any time after &lt;code&gt;prepare()&lt;/code&gt;. This</em>
@@ -403,147 +403,168 @@
 <a name="393" href="#393">393</a> <em class="jxr_javadoccomment">     * </em>
 <a name="394" href="#394">394</a> <em class="jxr_javadoccomment">     * @param secHeader The security header that holds the Signature element.</em>
 <a name="395" href="#395">395</a> <em class="jxr_javadoccomment">     */</em>
-<a name="396" href="#396">396</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> appendToHeader(<a href="../../../../../org/apache/ws/security/message/WSSecHeader.html">WSSecHeader</a> secHeader) {
-<a name="397" href="#397">397</a>         Element secHeaderElement = secHeader.getSecurityHeader();
-<a name="398" href="#398">398</a>         secHeaderElement.appendChild(encryptedKeyElement);
-<a name="399" href="#399">399</a>     }
-<a name="400" href="#400">400</a>     
-<a name="401" href="#401">401</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="402" href="#402">402</a> <em class="jxr_javadoccomment">     * Prepend the BinarySecurityToken to the elements already in the Security</em>
-<a name="403" href="#403">403</a> <em class="jxr_javadoccomment">     * header.</em>
-<a name="404" href="#404">404</a> <em class="jxr_javadoccomment">     * </em>
-<a name="405" href="#405">405</a> <em class="jxr_javadoccomment">     * The method can be called any time after &lt;code&gt;prepare()&lt;/code&gt;. This</em>
-<a name="406" href="#406">406</a> <em class="jxr_javadoccomment">     * allows to insert the BST element at any position in the Security header.</em>
+<a name="396" href="#396">396</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> prependToHeader(<a href="../../../../../org/apache/ws/security/message/WSSecHeader.html">WSSecHeader</a> secHeader) {
+<a name="397" href="#397">397</a>         WSSecurityUtil.prependChildElement(secHeader.getSecurityHeader(), encryptedKeyElement);
+<a name="398" href="#398">398</a>     }
+<a name="399" href="#399">399</a> 
+<a name="400" href="#400">400</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="401" href="#401">401</a> <em class="jxr_javadoccomment">     * Append the EncryptedKey element to the elements already in the Security</em>
+<a name="402" href="#402">402</a> <em class="jxr_javadoccomment">     * header.</em>
+<a name="403" href="#403">403</a> <em class="jxr_javadoccomment">     * </em>
+<a name="404" href="#404">404</a> <em class="jxr_javadoccomment">     * The method can be called any time after &lt;code&gt;prepare()&lt;/code&gt;. This</em>
+<a name="405" href="#405">405</a> <em class="jxr_javadoccomment">     * allows to insert the EncryptedKey element at any position in the Security</em>
+<a name="406" href="#406">406</a> <em class="jxr_javadoccomment">     * header.</em>
 <a name="407" href="#407">407</a> <em class="jxr_javadoccomment">     * </em>
-<a name="408" href="#408">408</a> <em class="jxr_javadoccomment">     * @param secHeader The security header that holds the BST element.</em>
+<a name="408" href="#408">408</a> <em class="jxr_javadoccomment">     * @param secHeader The security header that holds the Signature element.</em>
 <a name="409" href="#409">409</a> <em class="jxr_javadoccomment">     */</em>
-<a name="410" href="#410">410</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> prependBSTElementToHeader(<a href="../../../../../org/apache/ws/security/message/WSSecHeader.html">WSSecHeader</a> secHeader) {
-<a name="411" href="#411">411</a>         <strong class="jxr_keyword">if</strong> (bstToken != <strong class="jxr_keyword">null</strong>) {
-<a name="412" href="#412">412</a>             WSSecurityUtil.prependChildElement(
-<a name="413" href="#413">413</a>                 secHeader.getSecurityHeader(), bstToken.getElement()
-<a name="414" href="#414">414</a>             );
-<a name="415" href="#415">415</a>         }
-<a name="416" href="#416">416</a>         bstToken = <strong class="jxr_keyword">null</strong>;
-<a name="417" href="#417">417</a>     }
-<a name="418" href="#418">418</a> 
-<a name="419" href="#419">419</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="420" href="#420">420</a> <em class="jxr_javadoccomment">     * Append the BinarySecurityToken to the elements already in the Security</em>
-<a name="421" href="#421">421</a> <em class="jxr_javadoccomment">     * header.</em>
-<a name="422" href="#422">422</a> <em class="jxr_javadoccomment">     * </em>
-<a name="423" href="#423">423</a> <em class="jxr_javadoccomment">     * The method can be called any time after &lt;code&gt;prepare()&lt;/code&gt;. This</em>
-<a name="424" href="#424">424</a> <em class="jxr_javadoccomment">     * allows to insert the BST element at any position in the Security header.</em>
-<a name="425" href="#425">425</a> <em class="jxr_javadoccomment">     * </em>
-<a name="426" href="#426">426</a> <em class="jxr_javadoccomment">     * @param secHeader The security header that holds the BST element.</em>
-<a name="427" href="#427">427</a> <em class="jxr_javadoccomment">     */</em>
-<a name="428" href="#428">428</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> appendBSTElementToHeader(<a href="../../../../../org/apache/ws/security/message/WSSecHeader.html">WSSecHeader</a> secHeader) {
-<a name="429" href="#429">429</a>         <strong class="jxr_keyword">if</strong> (bstToken != <strong class="jxr_keyword">null</strong>) {
-<a name="430" href="#430">430</a>             Element secHeaderElement = secHeader.getSecurityHeader();
-<a name="431" href="#431">431</a>             secHeaderElement.appendChild(bstToken.getElement());
-<a name="432" href="#432">432</a>         }
-<a name="433" href="#433">433</a>         bstToken = <strong class="jxr_keyword">null</strong>;
-<a name="434" href="#434">434</a>     }
-<a name="435" href="#435">435</a>     
-<a name="436" href="#436">436</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="437" href="#437">437</a> <em class="jxr_javadoccomment">     * @return Returns the ephemeralKey.</em>
-<a name="438" href="#438">438</a> <em class="jxr_javadoccomment">     */</em>
-<a name="439" href="#439">439</a>     <strong class="jxr_keyword">public</strong> byte[] getEphemeralKey() {
-<a name="440" href="#440">440</a>         <strong class="jxr_keyword">return</strong> ephemeralKey;
-<a name="441" href="#441">441</a>     }
-<a name="442" href="#442">442</a>     
-<a name="443" href="#443">443</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="444" href="#444">444</a> <em class="jxr_javadoccomment">     * Set the X509 Certificate to use for encryption.</em>
-<a name="445" href="#445">445</a> <em class="jxr_javadoccomment">     * </em>
-<a name="446" href="#446">446</a> <em class="jxr_javadoccomment">     * If this is set &lt;b&gt;and&lt;/b&gt; the key identifier is set to</em>
-<a name="447" href="#447">447</a> <em class="jxr_javadoccomment">     * &lt;code&gt;DirectReference&lt;/code&gt; then use this certificate to get the</em>
-<a name="448" href="#448">448</a> <em class="jxr_javadoccomment">     * public key for encryption.</em>
-<a name="449" href="#449">449</a> <em class="jxr_javadoccomment">     * </em>
-<a name="450" href="#450">450</a> <em class="jxr_javadoccomment">     * @param cert is the X509 certificate to use for encryption</em>
-<a name="451" href="#451">451</a> <em class="jxr_javadoccomment">     */</em>
-<a name="452" href="#452">452</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setUseThisCert(X509Certificate cert) {
-<a name="453" href="#453">453</a>         useThisCert = cert;
-<a name="454" href="#454">454</a>     }
-<a name="455" href="#455">455</a> 
-<a name="456" href="#456">456</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="457" href="#457">457</a> <em class="jxr_javadoccomment">     * @return Returns the encryptedKeyElement.</em>
-<a name="458" href="#458">458</a> <em class="jxr_javadoccomment">     */</em>
-<a name="459" href="#459">459</a>     <strong class="jxr_keyword">public</strong> Element getEncryptedKeyElement() {
-<a name="460" href="#460">460</a>         <strong class="jxr_keyword">return</strong> encryptedKeyElement;
-<a name="461" href="#461">461</a>     }
-<a name="462" href="#462">462</a>     
-<a name="463" href="#463">463</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="464" href="#464">464</a> <em class="jxr_javadoccomment">     * Set the encrypted key element when a pre prepared encrypted key is used</em>
-<a name="465" href="#465">465</a> <em class="jxr_javadoccomment">     * @param encryptedKeyElement EncryptedKey element of the encrypted key used</em>
-<a name="466" href="#466">466</a> <em class="jxr_javadoccomment">     */</em>
-<a name="467" href="#467">467</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setEncryptedKeyElement(Element encryptedKeyElement) {
-<a name="468" href="#468">468</a>         <strong class="jxr_keyword">this</strong>.encryptedKeyElement = encryptedKeyElement;
-<a name="469" href="#469">469</a>     }
-<a name="470" href="#470">470</a>     
-<a name="471" href="#471">471</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="472" href="#472">472</a> <em class="jxr_javadoccomment">     * @return Returns the BinarySecurityToken element.</em>
-<a name="473" href="#473">473</a> <em class="jxr_javadoccomment">     */</em>
-<a name="474" href="#474">474</a>     <strong class="jxr_keyword">public</strong> Element getBinarySecurityTokenElement() {
-<a name="475" href="#475">475</a>         <strong class="jxr_keyword">if</strong> (<strong class="jxr_keyword">this</strong>.bstToken != <strong class="jxr_keyword">null</strong>) {
-<a name="476" href="#476">476</a>             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.bstToken.getElement();
-<a name="477" href="#477">477</a>         }
-<a name="478" href="#478">478</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="479" href="#479">479</a>     }
-<a name="480" href="#480">480</a> 
-<a name="481" href="#481">481</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeySize(<strong class="jxr_keyword">int</strong> keySize) <strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="482" href="#482">482</a>         <strong class="jxr_keyword">if</strong> (keySize &lt; 64) {
-<a name="483" href="#483">483</a>             <em class="jxr_comment">// Minimum size has to be 64 bits - E.g. A DES key</em>
-<a name="484" href="#484">484</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(<span class="jxr_string">"invalidKeySize"</span>);
-<a name="485" href="#485">485</a>         }
-<a name="486" href="#486">486</a>         <strong class="jxr_keyword">this</strong>.keySize = keySize;
-<a name="487" href="#487">487</a>     }
-<a name="488" href="#488">488</a> 
-<a name="489" href="#489">489</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyEncAlgo(String keyEncAlgo) {
-<a name="490" href="#490">490</a>         <strong class="jxr_keyword">this</strong>.keyEncAlgo = keyEncAlgo;
-<a name="491" href="#491">491</a>     }
-<a name="492" href="#492">492</a> 
-<a name="493" href="#493">493</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="494" href="#494">494</a> <em class="jxr_javadoccomment">     * @param ephemeralKey The ephemeralKey to set.</em>
-<a name="495" href="#495">495</a> <em class="jxr_javadoccomment">     */</em>
-<a name="496" href="#496">496</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setEphemeralKey(byte[] ephemeralKey) {
-<a name="497" href="#497">497</a>         <strong class="jxr_keyword">this</strong>.ephemeralKey = ephemeralKey;
-<a name="498" href="#498">498</a>     }
-<a name="499" href="#499">499</a>     
-<a name="500" href="#500">500</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="501" href="#501">501</a> <em class="jxr_javadoccomment">     * Get the id of the BSt generated  during &lt;code&gt;prepare()&lt;/code&gt;.</em>
-<a name="502" href="#502">502</a> <em class="jxr_javadoccomment">     * </em>
-<a name="503" href="#503">503</a> <em class="jxr_javadoccomment">     * @return Returns the the value of wsu:Id attribute of the </em>
-<a name="504" href="#504">504</a> <em class="jxr_javadoccomment">     * BinaruSecurityToken element.</em>
-<a name="505" href="#505">505</a> <em class="jxr_javadoccomment">     */</em>
-<a name="506" href="#506">506</a>     <strong class="jxr_keyword">public</strong> String getBSTTokenId() {
-<a name="507" href="#507">507</a>         <strong class="jxr_keyword">if</strong> (<strong class="jxr_keyword">this</strong>.bstToken == <strong class="jxr_keyword">null</strong>) {
-<a name="508" href="#508">508</a>             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
-<a name="509" href="#509">509</a>         }
-<a name="510" href="#510">510</a>         
-<a name="511" href="#511">511</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.bstToken.getID();
+<a name="410" href="#410">410</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> appendToHeader(<a href="../../../../../org/apache/ws/security/message/WSSecHeader.html">WSSecHeader</a> secHeader) {
+<a name="411" href="#411">411</a>         Element secHeaderElement = secHeader.getSecurityHeader();
+<a name="412" href="#412">412</a>         secHeaderElement.appendChild(encryptedKeyElement);
+<a name="413" href="#413">413</a>     }
+<a name="414" href="#414">414</a>     
+<a name="415" href="#415">415</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="416" href="#416">416</a> <em class="jxr_javadoccomment">     * Prepend the BinarySecurityToken to the elements already in the Security</em>
+<a name="417" href="#417">417</a> <em class="jxr_javadoccomment">     * header.</em>
+<a name="418" href="#418">418</a> <em class="jxr_javadoccomment">     * </em>
+<a name="419" href="#419">419</a> <em class="jxr_javadoccomment">     * The method can be called any time after &lt;code&gt;prepare()&lt;/code&gt;. This</em>
+<a name="420" href="#420">420</a> <em class="jxr_javadoccomment">     * allows to insert the BST element at any position in the Security header.</em>
+<a name="421" href="#421">421</a> <em class="jxr_javadoccomment">     * </em>
+<a name="422" href="#422">422</a> <em class="jxr_javadoccomment">     * @param secHeader The security header that holds the BST element.</em>
+<a name="423" href="#423">423</a> <em class="jxr_javadoccomment">     */</em>
+<a name="424" href="#424">424</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> prependBSTElementToHeader(<a href="../../../../../org/apache/ws/security/message/WSSecHeader.html">WSSecHeader</a> secHeader) {
+<a name="425" href="#425">425</a>         <strong class="jxr_keyword">if</strong> (bstToken != <strong class="jxr_keyword">null</strong>) {
+<a name="426" href="#426">426</a>             WSSecurityUtil.prependChildElement(
+<a name="427" href="#427">427</a>                 secHeader.getSecurityHeader(), bstToken.getElement()
+<a name="428" href="#428">428</a>             );
+<a name="429" href="#429">429</a>         }
+<a name="430" href="#430">430</a>         bstToken = <strong class="jxr_keyword">null</strong>;
+<a name="431" href="#431">431</a>     }
+<a name="432" href="#432">432</a> 
+<a name="433" href="#433">433</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="434" href="#434">434</a> <em class="jxr_javadoccomment">     * Append the BinarySecurityToken to the elements already in the Security</em>
+<a name="435" href="#435">435</a> <em class="jxr_javadoccomment">     * header.</em>
+<a name="436" href="#436">436</a> <em class="jxr_javadoccomment">     * </em>
+<a name="437" href="#437">437</a> <em class="jxr_javadoccomment">     * The method can be called any time after &lt;code&gt;prepare()&lt;/code&gt;. This</em>
+<a name="438" href="#438">438</a> <em class="jxr_javadoccomment">     * allows to insert the BST element at any position in the Security header.</em>
+<a name="439" href="#439">439</a> <em class="jxr_javadoccomment">     * </em>
+<a name="440" href="#440">440</a> <em class="jxr_javadoccomment">     * @param secHeader The security header that holds the BST element.</em>
+<a name="441" href="#441">441</a> <em class="jxr_javadoccomment">     */</em>
+<a name="442" href="#442">442</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> appendBSTElementToHeader(<a href="../../../../../org/apache/ws/security/message/WSSecHeader.html">WSSecHeader</a> secHeader) {
+<a name="443" href="#443">443</a>         <strong class="jxr_keyword">if</strong> (bstToken != <strong class="jxr_keyword">null</strong>) {
+<a name="444" href="#444">444</a>             Element secHeaderElement = secHeader.getSecurityHeader();
+<a name="445" href="#445">445</a>             secHeaderElement.appendChild(bstToken.getElement());
+<a name="446" href="#446">446</a>         }
+<a name="447" href="#447">447</a>         bstToken = <strong class="jxr_keyword">null</strong>;
+<a name="448" href="#448">448</a>     }
+<a name="449" href="#449">449</a>     
+<a name="450" href="#450">450</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="451" href="#451">451</a> <em class="jxr_javadoccomment">     * @return Returns the ephemeralKey.</em>
+<a name="452" href="#452">452</a> <em class="jxr_javadoccomment">     */</em>
+<a name="453" href="#453">453</a>     <strong class="jxr_keyword">public</strong> byte[] getEphemeralKey() {
+<a name="454" href="#454">454</a>         <strong class="jxr_keyword">return</strong> ephemeralKey;
+<a name="455" href="#455">455</a>     }
+<a name="456" href="#456">456</a>     
+<a name="457" href="#457">457</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="458" href="#458">458</a> <em class="jxr_javadoccomment">     * Set the X509 Certificate to use for encryption.</em>
+<a name="459" href="#459">459</a> <em class="jxr_javadoccomment">     * </em>
+<a name="460" href="#460">460</a> <em class="jxr_javadoccomment">     * If this is set &lt;b&gt;and&lt;/b&gt; the key identifier is set to</em>
+<a name="461" href="#461">461</a> <em class="jxr_javadoccomment">     * &lt;code&gt;DirectReference&lt;/code&gt; then use this certificate to get the</em>
+<a name="462" href="#462">462</a> <em class="jxr_javadoccomment">     * public key for encryption.</em>
+<a name="463" href="#463">463</a> <em class="jxr_javadoccomment">     * </em>
+<a name="464" href="#464">464</a> <em class="jxr_javadoccomment">     * @param cert is the X509 certificate to use for encryption</em>
+<a name="465" href="#465">465</a> <em class="jxr_javadoccomment">     */</em>
+<a name="466" href="#466">466</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setUseThisCert(X509Certificate cert) {
+<a name="467" href="#467">467</a>         useThisCert = cert;
+<a name="468" href="#468">468</a>     }
+<a name="469" href="#469">469</a> 
+<a name="470" href="#470">470</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="471" href="#471">471</a> <em class="jxr_javadoccomment">     * @return Returns the encryptedKeyElement.</em>
+<a name="472" href="#472">472</a> <em class="jxr_javadoccomment">     */</em>
+<a name="473" href="#473">473</a>     <strong class="jxr_keyword">public</strong> Element getEncryptedKeyElement() {
+<a name="474" href="#474">474</a>         <strong class="jxr_keyword">return</strong> encryptedKeyElement;
+<a name="475" href="#475">475</a>     }
+<a name="476" href="#476">476</a>     
+<a name="477" href="#477">477</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="478" href="#478">478</a> <em class="jxr_javadoccomment">     * Set the encrypted key element when a pre prepared encrypted key is used</em>
+<a name="479" href="#479">479</a> <em class="jxr_javadoccomment">     * @param encryptedKeyElement EncryptedKey element of the encrypted key used</em>
+<a name="480" href="#480">480</a> <em class="jxr_javadoccomment">     */</em>
+<a name="481" href="#481">481</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setEncryptedKeyElement(Element encryptedKeyElement) {
+<a name="482" href="#482">482</a>         <strong class="jxr_keyword">this</strong>.encryptedKeyElement = encryptedKeyElement;
+<a name="483" href="#483">483</a>     }
+<a name="484" href="#484">484</a>     
+<a name="485" href="#485">485</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="486" href="#486">486</a> <em class="jxr_javadoccomment">     * @return Returns the BinarySecurityToken element.</em>
+<a name="487" href="#487">487</a> <em class="jxr_javadoccomment">     */</em>
+<a name="488" href="#488">488</a>     <strong class="jxr_keyword">public</strong> Element getBinarySecurityTokenElement() {
+<a name="489" href="#489">489</a>         <strong class="jxr_keyword">if</strong> (<strong class="jxr_keyword">this</strong>.bstToken != <strong class="jxr_keyword">null</strong>) {
+<a name="490" href="#490">490</a>             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.bstToken.getElement();
+<a name="491" href="#491">491</a>         }
+<a name="492" href="#492">492</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="493" href="#493">493</a>     }
+<a name="494" href="#494">494</a> 
+<a name="495" href="#495">495</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeySize(<strong class="jxr_keyword">int</strong> keySize) <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="496" href="#496">496</a>         <strong class="jxr_keyword">if</strong> (keySize &lt; 64) {
+<a name="497" href="#497">497</a>             <em class="jxr_comment">// Minimum size has to be 64 bits - E.g. A DES key</em>
+<a name="498" href="#498">498</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/WSSecurityException.html">WSSecurityException</a>(<span class="jxr_string">"invalidKeySize"</span>);
+<a name="499" href="#499">499</a>         }
+<a name="500" href="#500">500</a>         <strong class="jxr_keyword">this</strong>.keySize = keySize;
+<a name="501" href="#501">501</a>     }
+<a name="502" href="#502">502</a> 
+<a name="503" href="#503">503</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setKeyEncAlgo(String keyEncAlgo) {
+<a name="504" href="#504">504</a>         <strong class="jxr_keyword">this</strong>.keyEncAlgo = keyEncAlgo;
+<a name="505" href="#505">505</a>     }
+<a name="506" href="#506">506</a> 
+<a name="507" href="#507">507</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="508" href="#508">508</a> <em class="jxr_javadoccomment">     * @param ephemeralKey The ephemeralKey to set.</em>
+<a name="509" href="#509">509</a> <em class="jxr_javadoccomment">     */</em>
+<a name="510" href="#510">510</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setEphemeralKey(byte[] ephemeralKey) {
+<a name="511" href="#511">511</a>         <strong class="jxr_keyword">this</strong>.ephemeralKey = ephemeralKey;
 <a name="512" href="#512">512</a>     }
-<a name="513" href="#513">513</a> 
+<a name="513" href="#513">513</a>     
 <a name="514" href="#514">514</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="515" href="#515">515</a> <em class="jxr_javadoccomment">     * @param document The document to set.</em>
-<a name="516" href="#516">516</a> <em class="jxr_javadoccomment">     */</em>
-<a name="517" href="#517">517</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setDocument(Document document) {
-<a name="518" href="#518">518</a>         <strong class="jxr_keyword">this</strong>.document = document;
-<a name="519" href="#519">519</a>     }
-<a name="520" href="#520">520</a> 
-<a name="521" href="#521">521</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="522" href="#522">522</a> <em class="jxr_javadoccomment">     * @param encKeyId The encKeyId to set.</em>
-<a name="523" href="#523">523</a> <em class="jxr_javadoccomment">     */</em>
-<a name="524" href="#524">524</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setEncKeyId(String encKeyId) {
-<a name="525" href="#525">525</a>         <strong class="jxr_keyword">this</strong>.encKeyId = encKeyId;
+<a name="515" href="#515">515</a> <em class="jxr_javadoccomment">     * Get the id of the BSt generated  during &lt;code&gt;prepare()&lt;/code&gt;.</em>
+<a name="516" href="#516">516</a> <em class="jxr_javadoccomment">     * </em>
+<a name="517" href="#517">517</a> <em class="jxr_javadoccomment">     * @return Returns the the value of wsu:Id attribute of the </em>
+<a name="518" href="#518">518</a> <em class="jxr_javadoccomment">     * BinaruSecurityToken element.</em>
+<a name="519" href="#519">519</a> <em class="jxr_javadoccomment">     */</em>
+<a name="520" href="#520">520</a>     <strong class="jxr_keyword">public</strong> String getBSTTokenId() {
+<a name="521" href="#521">521</a>         <strong class="jxr_keyword">if</strong> (<strong class="jxr_keyword">this</strong>.bstToken == <strong class="jxr_keyword">null</strong>) {
+<a name="522" href="#522">522</a>             <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">null</strong>;
+<a name="523" href="#523">523</a>         }
+<a name="524" href="#524">524</a>         
+<a name="525" href="#525">525</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">this</strong>.bstToken.getID();
 <a name="526" href="#526">526</a>     }
-<a name="527" href="#527">527</a>     
-<a name="528" href="#528">528</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> isCertSet() {
-<a name="529" href="#529">529</a>         <strong class="jxr_keyword">return</strong> (useThisCert == <strong class="jxr_keyword">null</strong> ? <strong class="jxr_keyword">true</strong> : false) ;
-<a name="530" href="#530">530</a>     }
-<a name="531" href="#531">531</a> 
-<a name="532" href="#532">532</a>     <strong class="jxr_keyword">public</strong> byte[] getEncryptedEphemeralKey() {
-<a name="533" href="#533">533</a>         <strong class="jxr_keyword">return</strong> encryptedEphemeralKey;
-<a name="534" href="#534">534</a>     }
-<a name="535" href="#535">535</a>     
-<a name="536" href="#536">536</a> }
+<a name="527" href="#527">527</a> 
+<a name="528" href="#528">528</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="529" href="#529">529</a> <em class="jxr_javadoccomment">     * @param document The document to set.</em>
+<a name="530" href="#530">530</a> <em class="jxr_javadoccomment">     */</em>
+<a name="531" href="#531">531</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setDocument(Document document) {
+<a name="532" href="#532">532</a>         <strong class="jxr_keyword">this</strong>.document = document;
+<a name="533" href="#533">533</a>     }
+<a name="534" href="#534">534</a> 
+<a name="535" href="#535">535</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="536" href="#536">536</a> <em class="jxr_javadoccomment">     * @param encKeyId The encKeyId to set.</em>
+<a name="537" href="#537">537</a> <em class="jxr_javadoccomment">     */</em>
+<a name="538" href="#538">538</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> setEncKeyId(String encKeyId) {
+<a name="539" href="#539">539</a>         <strong class="jxr_keyword">this</strong>.encKeyId = encKeyId;
+<a name="540" href="#540">540</a>     }
+<a name="541" href="#541">541</a>     
+<a name="542" href="#542">542</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">boolean</strong> isCertSet() {

[... 19 lines stripped ...]


Mime
View raw message