本文整理了Java中org.apache.ws.security.message.WSSecSignature.setKeyIdentifierType()
方法的一些代码示例,展示了WSSecSignature.setKeyIdentifierType()
的具体用法。这些代码示例主要来源于Github
/Stackoverflow
/Maven
等平台,是从一些精选项目中提取出来的代码,具有较强的参考意义,能在一定程度帮忙到你。WSSecSignature.setKeyIdentifierType()
方法的具体详情如下:
包路径:org.apache.ws.security.message.WSSecSignature
类名称:WSSecSignature
方法名:setKeyIdentifierType
暂无
代码示例来源:origin: be.e_contract.mycarenet/mycarenet-ehealth-common
wsSecSignature.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER);
wsSecSignature
.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE);
代码示例来源:origin: be.e_contract.mycarenet/mycarenet-ehealth-saml-sts
wssConfig.setWsiBSPCompliant(false);
WSSecSignature sign = new WSSecSignature(wssConfig);
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
sign.prepare(soapPart, crypto, wsSecHeader);
String bstId = sign.getBSTTokenId();
代码示例来源:origin: CyberSource/cybersource-sdk-java
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
sign.setUseSingleCertificate(true);
代码示例来源:origin: be.fedict.eid-trust-service/eid-trust-service-xkms2-ws-impl
wssConfig.setWsiBSPCompliant(false);
WSSecSignature sign = new WSSecSignature(wssConfig);
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
sign.prepare(soapPart, crypto, wsSecHeader);
sign.appendBSTElementToHeader(wsSecHeader);
代码示例来源:origin: org.apache.ws.security/wss4j
wsSign.setKeyIdentifierType(reqData.getSigKeyId());
代码示例来源:origin: org.apache.servicemix.bundles/org.apache.servicemix.bundles.wss4j
wsSign.setKeyIdentifierType(reqData.getSigKeyId());
代码示例来源:origin: org.apache.rampart/rampart-core
sig.setSignatureAlgorithm(algorithmSuite.getAsymmetricSignature());
sig.setSignatureAlgorithm(algorithmSuite.getSymmetricSignature());
sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
sig.prepare(rmd.getDocument(), RampartUtil.getSignatureCrypto(rpd
.getRampartConfig(), rmd.getCustomClassLoader()),
代码示例来源:origin: org.apache.rampart/rampart-core
sig.setSignatureAlgorithm(algorithmSuite.getAsymmetricSignature());
sig.setSignatureAlgorithm(algorithmSuite.getSymmetricSignature());
sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
sig.prepare(rmd.getDocument(), RampartUtil.getSignatureCrypto(rpd
.getRampartConfig(), rmd.getCustomClassLoader()),
代码示例来源:origin: org.apache.ws.security/wss4j
sign.setCustomTokenId(builder.getId());
sign.setSecretKey(builder.getSecretKey());
sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
if (reqData.getSigDigestAlgorithm() != null) {
sign.setDigestAlgo(reqData.getSigDigestAlgorithm());
代码示例来源:origin: org.apache.servicemix.bundles/org.apache.servicemix.bundles.wss4j
sign.setCustomTokenId(builder.getId());
sign.setSecretKey(builder.getSecretKey());
sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
if (reqData.getSigDigestAlgorithm() != null) {
sign.setDigestAlgo(reqData.getSigDigestAlgorithm());
代码示例来源:origin: org.apache.rampart/rampart-core
sig.setCustomTokenValueType(WSConstants.SOAPMESSAGE_NS11 + "#"
+ WSConstants.ENC_KEY_VALUE_TYPE);
sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
} else {
sig.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER);
sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
OMElement ref = tok.getAttachedReference();
if(ref == null) {
内容来源于网络,如有侵权,请联系作者删除!