Author: dimuthul
Date: Thu Feb 21 03:57:56 2008
New Revision: 13966
Log:
Formatting the code.
Modified:
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderSimulator.java
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderTest.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyData.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyFilter.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/IssuerCertificateUtil.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/SAMLTokenConsumer.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/SAMLTokenVerifier.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/X509CredentialImpl.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/X509CredentialUtil.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/SAML1TokenHolder.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/SAML2TokenHolder.java
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/TokenHolder.java
Modified:
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderSimulator.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderSimulator.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderSimulator.java
Thu Feb 21 03:57:56 2008
@@ -15,7 +15,7 @@
import org.wso2.solutions.identity.sts.IdentityProviderData;
/**
- * This simulator is written so that
+ * This simulator is written so that
*
*/
public class SAML1TokenBuilderSimulator
Modified:
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderTest.java
==============================================================================
---
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderTest.java
(original)
+++
trunk/solutions/identity/modules/identity-provider/src/test/java/org/wso2/solutions/identity/sts/saml/SAML1TokenBuilderTest.java
Thu Feb 21 03:57:56 2008
@@ -12,9 +12,10 @@
public class SAML1TokenBuilderTest
extends TestCase {
- static{
+ static {
Init.init();
}
+
public void testSAML1TokenCreation() throws Exception {
DefaultBootstrap.bootstrap();
@@ -32,12 +33,12 @@
builder.setSignature(XMLSignature.ALGO_ID_SIGNATURE_RSA, keyHolder);
builder.marshellAndSign();
Element elemSAML = builder.getSAMLasDOM();
-
- //now we have to compare something.
- //let's compare
-
-// String val = DOM2Writer.nodeToString(elemSAML);
-// System.out.println(val);
+
+ // now we have to compare something.
+ // let's compare
+
+ // String val = DOM2Writer.nodeToString(elemSAML);
+ // System.out.println(val);
}
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyData.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyData.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyData.java
Thu Feb 21 03:57:56 2008
@@ -15,7 +15,7 @@
public class RelyingPartyData {
private KeyStore systemStore = null;
-
+
private PrivateKey privateKey = null;
private String validatePolicy = null;
@@ -24,7 +24,6 @@
private KeyStore trustStore = null;
-
/**
* One array contains one DN name
*/
@@ -35,8 +34,6 @@
*/
private List[] whiteList = null;
-
-
/**
* This method read parameters from web.xml Step 1 : Read my private key
* Step 2 : Read the token validation policy Step 3 : Read paramters that
is
@@ -47,7 +44,7 @@
* details
*
*/
- public void loadData(FilterConfig filterConfig) throws ServletException{
+ public void loadData(FilterConfig filterConfig) throws ServletException {
String keyStore = filterConfig
.getInitParameter(TokenVerifierConstants.KEY_STORE);
String storeType = filterConfig
@@ -72,7 +69,8 @@
try {
KeyStore store = KeyStore.getInstance(storeType);
- String realPath =
filterConfig.getServletContext().getRealPath(keyStore);
+ String realPath = filterConfig.getServletContext().getRealPath(
+ keyStore);
store.load(new FileInputStream(realPath), storePass.toCharArray());
privateKey = (PrivateKey) store.getKey(keyAlias, keyPass
.toCharArray());
@@ -124,7 +122,8 @@
trustStore.load(new FileInputStream(realPath), IdPStorePass
.toCharArray());
} catch (Exception e) {
- throw new ServletException("Cannot load truted store"+
IdPstoreFilePath +" and "+IdPStorePass);
+ throw new ServletException("Cannot load truted store"
+ + IdPstoreFilePath + " and " + IdPStorePass);
}
String defaultStorePass = filterConfig
@@ -133,8 +132,7 @@
// assume that it hasn't been changed
defaultStorePass = "changeit";
}
-
-
+
String javaHome = System.getenv("JAVA_HOME");
if (javaHome == null) {
throw new ServletException("Cannot find JAVA_HOME");
@@ -154,7 +152,7 @@
sysKS.load(is, defaultStorePass.toCharArray());
} catch (Exception e) {
throw new ServletException("Cannot load system key store");
- }
+ }
}
}
@@ -206,7 +204,7 @@
public void setWhiteList(List[] whiteList) {
this.whiteList = whiteList;
}
-
+
public KeyStore getSystemStore() {
return systemStore;
}
@@ -244,7 +242,4 @@
return dnList;
}
-
-
-
}
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyFilter.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyFilter.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/relyingparty/servletfilter/RelyingPartyFilter.java
Thu Feb 21 03:57:56 2008
@@ -39,7 +39,6 @@
public static Log log = LogFactory.getLog(RelyingPartyFilter.class);
-
public RelyingPartyData data = null;
static {
WSSConfig.getDefaultWSConfig();
@@ -89,10 +88,11 @@
// differently.
OpenIDConsumer.getInstance().setInfocardSessionAttributes(
(HttpServletRequest) request);
- }else if (xmlToken != null && !isOpenIDInfoCardToken) {
+ } else if (xmlToken != null && !isOpenIDInfoCardToken) {
SAMLTokenConsumer.getInstance()
.setInfocardSessionAttributes(
- (HttpServletRequest) request, xmlToken,
data);
+ (HttpServletRequest) request, xmlToken,
+ data);
} else {
request.setAttribute(TokenVerifierConstants.ATTR_STATE,
TokenVerifierConstants.STATE_FAILURE);
@@ -112,8 +112,6 @@
chain.doFilter(request, response);
}
-
-
public void init(FilterConfig config) throws ServletException {
this.filterConfig = config;
data = new RelyingPartyData();
@@ -123,7 +121,4 @@
public void destroy() {
}
-
-
-
}
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/IssuerCertificateUtil.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/IssuerCertificateUtil.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/IssuerCertificateUtil.java
Thu Feb 21 03:57:56 2008
@@ -11,8 +11,6 @@
public class IssuerCertificateUtil {
-
-
/**
* This method is suppose to do the certificate validation. It should check
* for four things
@@ -27,8 +25,7 @@
* actual DN?
*/
public static boolean checkSystemStoree(X509Certificate signedCert,
- KeyStore trustStore, KeyStore systemStore)
- throws Exception {
+ KeyStore trustStore, KeyStore systemStore) throws Exception {
boolean isCertValid = false;
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/SAMLTokenConsumer.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/SAMLTokenConsumer.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/SAMLTokenConsumer.java
Thu Feb 21 03:57:56 2008
@@ -45,6 +45,7 @@
/**
* Returns the SAMLTokenConsuer
+ *
* @return
*/
public static SAMLTokenConsumer getInstance() {
@@ -55,10 +56,9 @@
}
/**
- * The control flow is
- * 1) Verify
- * 2) Validate policies
- * 3) Inject parameters into the HttpServletRequest
+ * The control flow is 1) Verify 2) Validate policies 3) Inject parameters
+ * into the HttpServletRequest
+ *
* @param request
* @param xmlToken
* @param data
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/SAMLTokenVerifier.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/SAMLTokenVerifier.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/SAMLTokenVerifier.java
Thu Feb 21 03:57:56 2008
@@ -204,8 +204,8 @@
throw new RelyingPartyException("signingCertNull");
/*
- do certificate validation
- for blacklist, whitelist and cert-validity
+ * do certificate validation for blacklist, whitelist and
+ * cert-validity
*/
signingCert.checkValidity();
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/X509CredentialImpl.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/X509CredentialImpl.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/X509CredentialImpl.java
Thu Feb 21 03:57:56 2008
@@ -26,6 +26,7 @@
private PublicKey publicKey = null;
private X509Certificate signingCert = null;
+
//cert chain
/**
@@ -41,7 +42,7 @@
KeyFactory keyFactory = KeyFactory.getInstance("RSA");
publicKey = keyFactory.generatePublic(spec);
}
-
+
public X509CredentialImpl(X509Certificate cert) {
publicKey = cert.getPublicKey();
signingCert = cert;
@@ -53,8 +54,7 @@
public PublicKey getPublicKey() {
return publicKey;
}
-
-
+
public X509Certificate getSigningCert() {
return signingCert;
}
@@ -70,8 +70,6 @@
return null;
}
-
-
public Collection<X509Certificate> getEntityCertificateChain() {
// TODO Auto-generated method stub
return null;
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/X509CredentialUtil.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/X509CredentialUtil.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/X509CredentialUtil.java
Thu Feb 21 03:57:56 2008
@@ -21,29 +21,31 @@
import org.wso2.solutions.identity.relyingparty.RelyingPartyException;
public class X509CredentialUtil {
-
+
public static KeyStore systemKeyStore = null;
-
- public static X509Credential loadCredentialFromTrustStore(String alias,
KeyStore trustStore) throws Exception{
+
+ public static X509Credential loadCredentialFromTrustStore(String alias,
+ KeyStore trustStore) throws Exception {
X509Credential credential = null;
- java.security.cert.X509Certificate cert = null;
- if(trustStore.containsAlias(alias)){
- cert =
(java.security.cert.X509Certificate)trustStore.getCertificate(alias);
+ java.security.cert.X509Certificate cert = null;
+ if (trustStore.containsAlias(alias)) {
+ cert = (java.security.cert.X509Certificate) trustStore
+ .getCertificate(alias);
credential = new X509CredentialImpl(cert);
}
return credential;
}
- public static X509Credential loadCredentialFromSignature(
- Signature signature) throws Exception {
+ public static X509Credential loadCredentialFromSignature(Signature
signature)
+ throws Exception {
X509Credential credential = null;
KeyInfo kinfo = signature.getKeyInfo();
-
- if(kinfo == null){
+
+ if (kinfo == null) {
// log.debug(); xxxx
return null;
}
-
+
List<X509Data> dataList = kinfo.getX509Datas();
List<KeyValue> keyValueList = kinfo.getKeyValues();
@@ -54,13 +56,15 @@
X509Data data = dataList.get(0);
List<X509Certificate> certList = data.getX509Certificates();
Iterator ite = certList.iterator();
- while(ite.hasNext()){
- X509Certificate certElem = (X509Certificate)ite.next();
+ while (ite.hasNext()) {
+ X509Certificate certElem = (X509Certificate) ite.next();
String certValue = certElem.getValue();
byte[] certInBytes = Base64.decode(certValue);
ByteArrayInputStream bis = new
ByteArrayInputStream(certInBytes);
- CertificateFactory factory =
CertificateFactory.getInstance("X509");
- java.security.cert.X509Certificate x509Cert =
(java.security.cert.X509Certificate)factory.generateCertificate(bis);
+ CertificateFactory factory = CertificateFactory
+ .getInstance("X509");
+ java.security.cert.X509Certificate x509Cert =
(java.security.cert.X509Certificate) factory
+ .generateCertificate(bis);
credential = new X509CredentialImpl(x509Cert);
}
} else if (keyValueList.size() > 0) {
@@ -81,7 +85,7 @@
BigInteger mod = Base64.decodeBigIntegerFromElement(modElem);
BigInteger exp = Base64.decodeBigIntegerFromElement(expElem);
credential = new X509CredentialImpl(mod, exp);
- }else{
+ } else {
// log.error("Unknow key "); log stuff xxxx
}
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/SAML1TokenHolder.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/SAML1TokenHolder.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/SAML1TokenHolder.java
Thu Feb 21 03:57:56 2008
@@ -27,10 +27,11 @@
private static Log log = LogFactory.getLog(SAML1TokenHolder.class);
/**
- * Creates the SAML object from the element
- * This method must be called first
+ * Creates the SAML object from the element This method must be called
first
+ *
* @param elem
- * @throws UnmarshallingException If the token creation fails
+ * @throws UnmarshallingException
+ * If the token creation fails
*/
public void createToken(Element elem) throws UnmarshallingException {
UnmarshallerFactory unmarshallerFactory = Configuration
@@ -49,6 +50,7 @@
/**
* Issuer of the SAML token
+ *
* @return
*/
public String getIssuerName() {
@@ -57,6 +59,7 @@
/**
* Populates the attributes.
+ *
* @param attributeTable
*/
public void populateAttributeTable(Map attributeTable) {
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/SAML2TokenHolder.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/SAML2TokenHolder.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/SAML2TokenHolder.java
Thu Feb 21 03:57:56 2008
@@ -27,10 +27,11 @@
private static Log log = LogFactory.getLog(SAML1TokenHolder.class);
/**
- * Creates the SAML object from the element
- * This method must be called first
+ * Creates the SAML object from the element This method must be called
first
+ *
* @param elem
- * @throws UnmarshallingException If the token creation fails
+ * @throws UnmarshallingException
+ * If the token creation fails
*/
public void createToken(Element elem) throws UnmarshallingException {
UnmarshallerFactory unmarshallerFactory = Configuration
@@ -49,6 +50,7 @@
/**
* Issuer of the SAML token
+ *
* @return
*/
public String getIssuerName() {
@@ -57,6 +59,7 @@
/**
* Populates the attributes.
+ *
* @param attributeTable
*/
public void populateAttributeTable(Map attributeTable) {
Modified:
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/TokenHolder.java
==============================================================================
---
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/TokenHolder.java
(original)
+++
trunk/solutions/identity/modules/token-verifier-core/src/main/java/org/wso2/solutions/identity/saml/relyingparty/tokens/TokenHolder.java
Thu Feb 21 03:57:56 2008
@@ -9,10 +9,11 @@
public interface TokenHolder {
/**
- * Creates the SAML object from the element
- * This method must be called first
+ * Creates the SAML object from the element This method must be called
first
+ *
* @param elem
- * @throws UnmarshallingException If the token creation fails
+ * @throws UnmarshallingException
+ * If the token creation fails
*/
public void createToken(Element elem) throws UnmarshallingException;
@@ -23,12 +24,14 @@
/**
* Populates the attributes.
+ *
* @param attributeTable
*/
public void populateAttributeTable(Map attributeTable);
/**
* Issuer of the SAML token
+ *
* @return
*/
public String getIssuerName();
_______________________________________________
Identity-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/identity-dev