Repository: cxf Updated Branches: refs/heads/3.1.x-fixes 8eeef8c9f -> 69c28ad3f
Some updates following WSS4J changes Project: http://git-wip-us.apache.org/repos/asf/cxf/repo Commit: http://git-wip-us.apache.org/repos/asf/cxf/commit/c99738fc Tree: http://git-wip-us.apache.org/repos/asf/cxf/tree/c99738fc Diff: http://git-wip-us.apache.org/repos/asf/cxf/diff/c99738fc Branch: refs/heads/3.1.x-fixes Commit: c99738fc3bfa680bb332a0ad027c430ea0798c0b Parents: 8eeef8c Author: Colm O hEigeartaigh <cohei...@apache.org> Authored: Wed Jan 13 12:26:45 2016 +0000 Committer: Colm O hEigeartaigh <cohei...@apache.org> Committed: Mon Mar 14 14:27:53 2016 +0000 ---------------------------------------------------------------------- .../KerberosTokenInterceptorProvider.java | 2 +- .../policy/interceptors/NegotiationUtils.java | 2 +- .../ws/security/wss4j/StaxActionInInterceptor.java | 12 ++++++------ .../ws/security/wss4j/StaxCryptoCoverageChecker.java | 8 ++++---- .../wss4j/StaxSecurityContextInInterceptor.java | 14 +++++++------- .../cxf/ws/security/wss4j/WSS4JStaxInInterceptor.java | 2 +- .../ws/security/wss4j/WSS4JStaxOutInterceptor.java | 2 +- .../policyhandlers/StaxSymmetricBindingHandler.java | 12 ++++++------ .../apache/cxf/sts/operation/TokenIssueOperation.java | 2 +- .../apache/cxf/sts/token/canceller/SCTCanceller.java | 2 +- .../cxf/sts/token/provider/TokenProviderUtils.java | 2 +- 11 files changed, 30 insertions(+), 30 deletions(-) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/KerberosTokenInterceptorProvider.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/KerberosTokenInterceptorProvider.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/KerberosTokenInterceptorProvider.java index e64f510..fe5e3af 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/KerberosTokenInterceptorProvider.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/KerberosTokenInterceptorProvider.java @@ -283,7 +283,7 @@ public class KerberosTokenInterceptorProvider extends AbstractPolicyInterceptorP (List<SecurityEvent>)message.get(SecurityEvent.class.getName() + ".in"); if (incomingEventList != null) { for (SecurityEvent incomingEvent : incomingEventList) { - if (WSSecurityEventConstants.KerberosToken + if (WSSecurityEventConstants.KERBEROS_TOKEN == incomingEvent.getSecurityEventType()) { return incomingEvent; } http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/NegotiationUtils.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/NegotiationUtils.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/NegotiationUtils.java index 884c333..14fe525 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/NegotiationUtils.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/policy/interceptors/NegotiationUtils.java @@ -211,7 +211,7 @@ final class NegotiationUtils { (List<SecurityEvent>) message.getExchange().get(SecurityEvent.class.getName() + ".in"); if (incomingEventList != null) { for (SecurityEvent incomingEvent : incomingEventList) { - if (WSSecurityEventConstants.SecurityContextToken + if (WSSecurityEventConstants.SECURITY_CONTEXT_TOKEN == incomingEvent.getSecurityEventType()) { return true; } http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxActionInInterceptor.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxActionInInterceptor.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxActionInInterceptor.java index e64a71c..7559638 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxActionInInterceptor.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxActionInInterceptor.java @@ -73,10 +73,10 @@ public class StaxActionInInterceptor extends AbstractPhaseInterceptor<SoapMessag // First check for a SOAP Fault with no security header if we are the client if (MessageUtils.isRequestor(soapMessage) - && isEventInResults(WSSecurityEventConstants.NoSecurity, incomingSecurityEventList)) { + && isEventInResults(WSSecurityEventConstants.NO_SECURITY, incomingSecurityEventList)) { OperationSecurityEvent securityEvent = (OperationSecurityEvent)findEvent( - WSSecurityEventConstants.Operation, incomingSecurityEventList + WSSecurityEventConstants.OPERATION, incomingSecurityEventList ); if (securityEvent != null && soapMessage.getVersion().getFault().equals(securityEvent.getOperation())) { @@ -88,14 +88,14 @@ public class StaxActionInInterceptor extends AbstractPhaseInterceptor<SoapMessag for (XMLSecurityConstants.Action action : inActions) { Event requiredEvent = null; if (WSSConstants.TIMESTAMP.equals(action)) { - requiredEvent = WSSecurityEventConstants.Timestamp; + requiredEvent = WSSecurityEventConstants.TIMESTAMP; } else if (WSSConstants.USERNAMETOKEN.equals(action)) { - requiredEvent = WSSecurityEventConstants.UsernameToken; + requiredEvent = WSSecurityEventConstants.USERNAME_TOKEN; } else if (WSSConstants.SIGNATURE.equals(action)) { requiredEvent = WSSecurityEventConstants.SignatureValue; } else if (WSSConstants.SAML_TOKEN_SIGNED.equals(action) || WSSConstants.SAML_TOKEN_UNSIGNED.equals(action)) { - requiredEvent = WSSecurityEventConstants.SamlToken; + requiredEvent = WSSecurityEventConstants.SAML_TOKEN; } if (requiredEvent != null @@ -108,7 +108,7 @@ public class StaxActionInInterceptor extends AbstractPhaseInterceptor<SoapMessag if (WSSConstants.ENCRYPT.equals(action)) { boolean foundEncryptionPart = - isEventInResults(WSSecurityEventConstants.EncryptedPart, incomingSecurityEventList); + isEventInResults(WSSecurityEventConstants.ENCRYPTED_PART, incomingSecurityEventList); if (!foundEncryptionPart) { foundEncryptionPart = isEventInResults(WSSecurityEventConstants.EncryptedElement, incomingSecurityEventList); http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxCryptoCoverageChecker.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxCryptoCoverageChecker.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxCryptoCoverageChecker.java index 14c60c5..0450f6d 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxCryptoCoverageChecker.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxCryptoCoverageChecker.java @@ -87,13 +87,13 @@ public class StaxCryptoCoverageChecker extends AbstractPhaseInterceptor<SoapMess if (incomingSecurityEventList != null) { // Get all Signed/Encrypted Results results.addAll( - getEventFromResults(WSSecurityEventConstants.SignedPart, incomingSecurityEventList)); + getEventFromResults(WSSecurityEventConstants.SIGNED_PART, incomingSecurityEventList)); results.addAll( getEventFromResults(WSSecurityEventConstants.SignedElement, incomingSecurityEventList)); if (encryptBody || encryptUsernameToken) { results.addAll( - getEventFromResults(WSSecurityEventConstants.EncryptedPart, incomingSecurityEventList)); + getEventFromResults(WSSecurityEventConstants.ENCRYPTED_PART, incomingSecurityEventList)); results.addAll( getEventFromResults(WSSecurityEventConstants.EncryptedElement, incomingSecurityEventList)); } @@ -106,7 +106,7 @@ public class StaxCryptoCoverageChecker extends AbstractPhaseInterceptor<SoapMess if (signTimestamp) { // We only insist on the Timestamp being signed if it is actually present in the message List<SecurityEvent> timestampResults = - getEventFromResults(WSSecurityEventConstants.Timestamp, incomingSecurityEventList); + getEventFromResults(WSSecurityEventConstants.TIMESTAMP, incomingSecurityEventList); if (!timestampResults.isEmpty()) { checkSignedTimestamp(results); } @@ -122,7 +122,7 @@ public class StaxCryptoCoverageChecker extends AbstractPhaseInterceptor<SoapMess // We only insist on the UsernameToken being signed/encrypted if it is actually // present in the message List<SecurityEvent> usernameTokenResults = - getEventFromResults(WSSecurityEventConstants.UsernameToken, incomingSecurityEventList); + getEventFromResults(WSSecurityEventConstants.USERNAME_TOKEN, incomingSecurityEventList); if (!usernameTokenResults.isEmpty()) { if (signUsernameToken) { checkSignedUsernameToken(results); http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSecurityContextInInterceptor.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSecurityContextInInterceptor.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSecurityContextInInterceptor.java index 9cd3f80..c20105a 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSecurityContextInInterceptor.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/StaxSecurityContextInInterceptor.java @@ -92,9 +92,9 @@ public class StaxSecurityContextInInterceptor extends AbstractPhaseInterceptor<S // Now go through the results in a certain order to set up a security context. Highest priority is first. List<Event> desiredSecurityEvents = new ArrayList<>(); - desiredSecurityEvents.add(WSSecurityEventConstants.SamlToken); - desiredSecurityEvents.add(WSSecurityEventConstants.UsernameToken); - desiredSecurityEvents.add(WSSecurityEventConstants.KerberosToken); + desiredSecurityEvents.add(WSSecurityEventConstants.SAML_TOKEN); + desiredSecurityEvents.add(WSSecurityEventConstants.USERNAME_TOKEN); + desiredSecurityEvents.add(WSSecurityEventConstants.KERBEROS_TOKEN); desiredSecurityEvents.add(WSSecurityEventConstants.X509Token); desiredSecurityEvents.add(WSSecurityEventConstants.KeyValueToken); @@ -130,7 +130,7 @@ public class StaxSecurityContextInInterceptor extends AbstractPhaseInterceptor<S Object receivedAssertion = null; - if (desiredEvent == WSSecurityEventConstants.SamlToken) { + if (desiredEvent == WSSecurityEventConstants.SAML_TOKEN) { String roleAttributeName = (String)SecurityUtils.getSecurityPropertyValue( SecurityConstants.SAML_ROLE_ATTRIBUTENAME, msg); if (roleAttributeName == null || roleAttributeName.length() == 0) { @@ -162,9 +162,9 @@ public class StaxSecurityContextInInterceptor extends AbstractPhaseInterceptor<S Event desiredEvent) throws XMLSecurityException { for (SecurityEvent event : incomingSecurityEventList) { if (desiredEvent == event.getSecurityEventType()) { - if (event.getSecurityEventType() == WSSecurityEventConstants.UsernameToken) { + if (event.getSecurityEventType() == WSSecurityEventConstants.USERNAME_TOKEN) { return ((UsernameTokenSecurityEvent)event).getSecurityToken(); - } else if (event.getSecurityEventType() == WSSecurityEventConstants.SamlToken + } else if (event.getSecurityEventType() == WSSecurityEventConstants.SAML_TOKEN && isSamlEventSigned((SamlTokenSecurityEvent)event)) { return ((SamlTokenSecurityEvent)event).getSecurityToken(); } else if (event.getSecurityEventType() == WSSecurityEventConstants.X509Token @@ -173,7 +173,7 @@ public class StaxSecurityContextInInterceptor extends AbstractPhaseInterceptor<S } else if (event.getSecurityEventType() == WSSecurityEventConstants.KeyValueToken && isUsedForPublicKeySignature(((KeyValueTokenSecurityEvent)event).getSecurityToken())) { return ((KeyValueTokenSecurityEvent)event).getSecurityToken(); - } else if (event.getSecurityEventType() == WSSecurityEventConstants.KerberosToken) { + } else if (event.getSecurityEventType() == WSSecurityEventConstants.KERBEROS_TOKEN) { return ((KerberosTokenSecurityEvent)event).getSecurityToken(); } } http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JStaxInInterceptor.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JStaxInInterceptor.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JStaxInInterceptor.java index 6579401..58a4955 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JStaxInInterceptor.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JStaxInInterceptor.java @@ -184,7 +184,7 @@ public class WSS4JStaxInInterceptor extends AbstractWSS4JStaxInterceptor { final SecurityEventListener securityEventListener = new SecurityEventListener() { @Override public void registerSecurityEvent(SecurityEvent securityEvent) throws WSSecurityException { - if (securityEvent.getSecurityEventType() == WSSecurityEventConstants.Timestamp + if (securityEvent.getSecurityEventType() == WSSecurityEventConstants.TIMESTAMP || securityEvent.getSecurityEventType() == WSSecurityEventConstants.SignatureValue || securityEvent instanceof TokenSecurityEvent || securityEvent instanceof AbstractSecuredElementSecurityEvent) { http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JStaxOutInterceptor.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JStaxOutInterceptor.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JStaxOutInterceptor.java index 1026624..f701d4b 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JStaxOutInterceptor.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/WSS4JStaxOutInterceptor.java @@ -194,7 +194,7 @@ public class WSS4JStaxOutInterceptor extends AbstractWSS4JStaxInterceptor { final SecurityEventListener securityEventListener = new SecurityEventListener() { @Override public void registerSecurityEvent(SecurityEvent securityEvent) throws XMLSecurityException { - if (securityEvent.getSecurityEventType() == WSSecurityEventConstants.SamlToken) { + if (securityEvent.getSecurityEventType() == WSSecurityEventConstants.SAML_TOKEN) { // Store SAML keys in case we need them on the inbound side TokenSecurityEvent<?> tokenSecurityEvent = (TokenSecurityEvent<?>)securityEvent; WSS4JUtils.parseAndStoreStreamingSecurityToken(tokenSecurityEvent.getSecurityToken(), msg); http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java index 32a038b..aa4137f 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java @@ -173,7 +173,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { if (tok == null && !isRequestor()) { org.apache.xml.security.stax.securityToken.SecurityToken securityToken = - findInboundSecurityToken(WSSecurityEventConstants.SamlToken); + findInboundSecurityToken(WSSecurityEventConstants.SAML_TOKEN); tokenId = WSS4JUtils.parseAndStoreStreamingSecurityToken(securityToken, message); } } else if (encryptionToken instanceof SecureConversationToken @@ -186,7 +186,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { properties.addAction(actionToPerform); } else if (tok == null && !isRequestor()) { org.apache.xml.security.stax.securityToken.SecurityToken securityToken = - findInboundSecurityToken(WSSecurityEventConstants.SecurityContextToken); + findInboundSecurityToken(WSSecurityEventConstants.SECURITY_CONTEXT_TOKEN); tokenId = WSS4JUtils.parseAndStoreStreamingSecurityToken(securityToken, message); } } else if (encryptionToken instanceof X509Token) { @@ -299,7 +299,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { if (sigTok == null && !isRequestor()) { org.apache.xml.security.stax.securityToken.SecurityToken securityToken = - findInboundSecurityToken(WSSecurityEventConstants.SamlToken); + findInboundSecurityToken(WSSecurityEventConstants.SAML_TOKEN); sigTokId = WSS4JUtils.parseAndStoreStreamingSecurityToken(securityToken, message); } } else if (sigToken instanceof SecureConversationToken @@ -312,7 +312,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { properties.addAction(actionToPerform); } else if (sigTok == null && !isRequestor()) { org.apache.xml.security.stax.securityToken.SecurityToken securityToken = - findInboundSecurityToken(WSSecurityEventConstants.SecurityContextToken); + findInboundSecurityToken(WSSecurityEventConstants.SECURITY_CONTEXT_TOKEN); sigTokId = WSS4JUtils.parseAndStoreStreamingSecurityToken(securityToken, message); } } else if (sigToken instanceof X509Token) { @@ -620,7 +620,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { (List<SecurityEvent>) message.getExchange().get(SecurityEvent.class.getName() + ".in"); if (incomingEventList != null) { for (SecurityEvent incomingEvent : incomingEventList) { - if (WSSecurityEventConstants.EncryptedPart == incomingEvent.getSecurityEventType() + if (WSSecurityEventConstants.ENCRYPTED_PART == incomingEvent.getSecurityEventType() || WSSecurityEventConstants.EncryptedElement == incomingEvent.getSecurityEventType()) { org.apache.xml.security.stax.securityToken.SecurityToken token = @@ -638,7 +638,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { // Fall back to a Signature in case there was no encrypted Element in the request for (SecurityEvent incomingEvent : incomingEventList) { - if (WSSecurityEventConstants.SignedPart == incomingEvent.getSecurityEventType() + if (WSSecurityEventConstants.SIGNED_PART == incomingEvent.getSecurityEventType() || WSSecurityEventConstants.SignedElement == incomingEvent.getSecurityEventType()) { org.apache.xml.security.stax.securityToken.SecurityToken token = http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/services/sts/sts-core/src/main/java/org/apache/cxf/sts/operation/TokenIssueOperation.java ---------------------------------------------------------------------- diff --git a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/operation/TokenIssueOperation.java b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/operation/TokenIssueOperation.java index e4c204f..455a9ae 100644 --- a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/operation/TokenIssueOperation.java +++ b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/operation/TokenIssueOperation.java @@ -398,7 +398,7 @@ public class TokenIssueOperation extends AbstractOperation implements IssueOpera // Now try steaming results try { org.apache.xml.security.stax.securityToken.SecurityToken securityToken = - findInboundSecurityToken(WSSecurityEventConstants.SamlToken, messageContext); + findInboundSecurityToken(WSSecurityEventConstants.SAML_TOKEN, messageContext); if (securityToken instanceof SamlSecurityToken && ((SamlSecurityToken)securityToken).getSamlAssertionWrapper() != null) { return ((SamlSecurityToken)securityToken).getSamlAssertionWrapper(); http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/canceller/SCTCanceller.java ---------------------------------------------------------------------- diff --git a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/canceller/SCTCanceller.java b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/canceller/SCTCanceller.java index ff03540..795c0a9 100644 --- a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/canceller/SCTCanceller.java +++ b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/canceller/SCTCanceller.java @@ -186,7 +186,7 @@ public class SCTCanceller implements TokenCanceller { (List<SecurityEvent>) messageContext.get(SecurityEvent.class.getName() + ".in"); if (incomingEventList != null) { for (SecurityEvent incomingEvent : incomingEventList) { - if (WSSecurityEventConstants.SignedPart == incomingEvent.getSecurityEventType() + if (WSSecurityEventConstants.SIGNED_PART == incomingEvent.getSecurityEventType() || WSSecurityEventConstants.SignedElement == incomingEvent.getSecurityEventType()) { org.apache.xml.security.stax.securityToken.SecurityToken token = http://git-wip-us.apache.org/repos/asf/cxf/blob/c99738fc/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/TokenProviderUtils.java ---------------------------------------------------------------------- diff --git a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/TokenProviderUtils.java b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/TokenProviderUtils.java index 57e9994..c0794a1 100644 --- a/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/TokenProviderUtils.java +++ b/services/sts/sts-core/src/main/java/org/apache/cxf/sts/token/provider/TokenProviderUtils.java @@ -193,7 +193,7 @@ public final class TokenProviderUtils { (List<SecurityEvent>) messageContext.get(SecurityEvent.class.getName() + ".in"); if (incomingEventList != null) { for (SecurityEvent incomingEvent : incomingEventList) { - if (WSSecurityEventConstants.SignedPart == incomingEvent.getSecurityEventType() + if (WSSecurityEventConstants.SIGNED_PART == incomingEvent.getSecurityEventType() || WSSecurityEventConstants.SignedElement == incomingEvent.getSecurityEventType()) { org.apache.xml.security.stax.securityToken.SecurityToken token =