Methods Summary |
---|
public java.lang.String | getAuthenticationType()
populate();
return authenticationType;
|
public java.lang.String | getCanonicalizationAlgorithm()
populate();
return canonAlgo;
|
public java.lang.String | getComputedKeyAlgorithm()
populate();
return computedKeyAlgo;
|
public java.lang.String | getEncryptWith()
populate();
return encryptWith;
|
public java.lang.String | getEncryptionAlgorithm()
populate();
return encAlgo;
|
public boolean | getEncryptionRequired()
populate();
return isEncRequired;
|
public int | getKeySize()
populate();
return keySize;
|
public java.lang.String | getKeyType()
populate();
return keyType;
|
public com.sun.xml.ws.security.policy.Lifetime | getLifetime()
populate();
return lifeTime;
|
public boolean | getProofEncryptionRequired()
populate();
return isProofEncRequired;
|
public java.lang.String | getRequestType()
populate();
return this.requestType;
|
public java.lang.String | getSignWith()
populate();
return signWith;
|
public java.lang.String | getSignatureAlgorithm()
populate();
return sigAlgo;
|
public java.lang.String | getTokenType()
populate();
return tokenType;
|
public java.lang.String | getTrustVersion()
throw new UnsupportedOperationException();
|
private void | populate()
populate(false);
|
private synchronized AssertionFitness | populate(boolean isServer)
if(!populated){
if ( this.hasNestedAssertions() ) {
Iterator <PolicyAssertion> it =this.getNestedAssertionsIterator();
while( it.hasNext() ) {
PolicyAssertion assertion = (PolicyAssertion) it.next();
//TODO: Support all RequestSecurityTokenTemplate elements
if ( PolicyUtil.isKeyType(assertion) ) {
this.keyType = assertion.getValue();
} else if ( PolicyUtil.isKeySize(assertion) ) {
this.keySize = Integer.valueOf(assertion.getValue());
} else if ( PolicyUtil.isEncryption(assertion) ) {
this.isEncRequired = true;
} else if ( PolicyUtil.isProofEncryption(assertion) ) {
this.isProofEncRequired = true;
} else if ( PolicyUtil.isLifeTime(assertion) ) {
this.lifeTime = (Lifetime) assertion;
}else if(PolicyUtil.isSignWith(assertion)){
this.signWith = assertion.getValue();
}else if(PolicyUtil.isTrustTokenType(assertion)){
this.tokenType = assertion.getValue();
}else if(PolicyUtil.isRequestType(assertion)){
this.tokenType = assertion.getValue();
}else if(PolicyUtil.isAuthenticationType(assertion)){
this.tokenType = assertion.getValue();
}else if(PolicyUtil.isSignatureAlgorithm(assertion)){
this.tokenType = assertion.getValue();
}else if(PolicyUtil.isEncryptionAlgorithm(assertion)){
this.tokenType = assertion.getValue();
}else if(PolicyUtil.isCanonicalizationAlgorithm(assertion)){
this.tokenType = assertion.getValue();
}else if(PolicyUtil.isComputedKeyAlgorithm(assertion)){
this.tokenType = assertion.getValue();
}else if(PolicyUtil.isProofEncryption(assertion)){
isProofEncRequired = true;
}else if(PolicyUtil.isEncryption(assertion)){
isEncRequired = true;
}else if(PolicyUtil.isClaimsElement(assertion)) {
// Valid assertion.
}else if(PolicyUtil.isEntropyElement(assertion)){
// Valid assertion.
}else {
if(!assertion.isOptional()){
log_invalid_assertion(assertion, isServer,RequestSecurityTokenTemplate);
fitness = AssertionFitness.HAS_UNKNOWN_ASSERTION;
}
}
}
}
populated = true;
}
return fitness;
|
public AssertionFitness | validate(boolean isServer)
return populate(isServer);
|