This is an automated email from the ASF dual-hosted git repository.

billblough pushed a commit to branch RAMPART-426
in repository https://gitbox.apache.org/repos/asf/axis-axis2-java-rampart.git

commit 1632238ae5ca7cd9b751d5ad02103626e44394d7
Author: Andreas Veithen <veit...@apache.org>
AuthorDate: Sat Jan 28 23:52:27 2017 +0000

    Remove extra null check from patch.
---
 .../java/org/apache/rampart/RampartEngine.java     | 170 ++++++++++-----------
 1 file changed, 84 insertions(+), 86 deletions(-)

diff --git 
a/modules/rampart-core/src/main/java/org/apache/rampart/RampartEngine.java 
b/modules/rampart-core/src/main/java/org/apache/rampart/RampartEngine.java
index e43f2b6..f4c17fa 100644
--- a/modules/rampart-core/src/main/java/org/apache/rampart/RampartEngine.java
+++ b/modules/rampart-core/src/main/java/org/apache/rampart/RampartEngine.java
@@ -293,92 +293,90 @@ public class RampartEngine {
                
                //Store username in MessageContext property
                
-               if(null != results){
-               for (int j = 0; j < results.size(); j++) {
-                   WSSecurityEngineResult wser = (WSSecurityEngineResult) 
results.get(j);
-                   final Integer actInt =
-                           (Integer) 
wser.get(WSSecurityEngineResult.TAG_ACTION);
-                   if (WSConstants.ST_UNSIGNED == actInt.intValue()) {
-
-                       Object samlAssertion = 
wser.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
-
-                       SAMLAssertionHandler samlAssertionHandler
-                               = 
SAMLAssertionHandlerFactory.createAssertionHandler(samlAssertion);
-
-                       if (samlAssertionHandler.isBearerAssertion()) {
-                           break;
-                       }
-                       //Store the token
-                       try {
-                           TokenStorage store = rmd.getTokenStorage();
-                           if 
(store.getToken(samlAssertionHandler.getAssertionId()) == null) {
-                               Token token = new 
Token(samlAssertionHandler.getAssertionId(),
-                                       
samlAssertionHandler.getAssertionElement(),
-                                       samlAssertionHandler.getDateNotBefore(),
-                                       
samlAssertionHandler.getDateNotOnOrAfter());
-
-                               token.setSecret(samlAssertionHandler.
-                                       
getAssertionKeyInfoSecret(signatureCrypto, tokenCallbackHandler));
-                               store.add(token);
-                           }
-                       } catch (Exception e) {
-                           throw new RampartException(
-                                   "errorInAddingTokenIntoStore", e);
-                       }
-                   } else if (WSConstants.UT == actInt) {
-
-                               WSUsernameTokenPrincipal userNameTokenPrincipal 
= (WSUsernameTokenPrincipal)wser.get(WSSecurityEngineResult.TAG_PRINCIPAL);
-
-                       String username = userNameTokenPrincipal.getName();
-                       msgCtx.setProperty(RampartMessageData.USERNAME, 
username);
-                       
-                       if (userNameTokenPrincipal.getNonce() != null) {
-                           // Check whether this is a replay attack. To verify 
that we need to check whether nonce value
-                           // is a repeating one
-                           int nonceLifeTimeInSeconds = 0;
-
-                           if (rpd.getRampartConfig() != null) {
-                               
-                               String stringLifeTime = 
rpd.getRampartConfig().getNonceLifeTime();
-
-                               try {
-                                   nonceLifeTimeInSeconds = 
Integer.parseInt(stringLifeTime);
-
-                               } catch (NumberFormatException e) {
-                                   log.error("Invalid value for nonceLifeTime 
in rampart configuration file.", e);
-                                   throw new RampartException(
-                                               "invalidNonceLifeTime", e);
-
-                               }
-                           }
-
-                           String serviceEndpointName = 
msgCtx.getAxisService().getEndpointName();
-
-                           boolean valueRepeating = 
serviceNonceCache.isNonceRepeatingForService(serviceEndpointName, username, 
userNameTokenPrincipal.getNonce());
-
-                           if (valueRepeating){
-                               throw new 
RampartException("repeatingNonceValue", new Object[]{ 
userNameTokenPrincipal.getNonce(), username} );
-                           }
-
-                           
serviceNonceCache.addNonceForService(serviceEndpointName, username, 
userNameTokenPrincipal.getNonce(), nonceLifeTimeInSeconds);
-                       }
-                   } else if (WSConstants.SIGN == actInt) {
-                       X509Certificate cert = (X509Certificate) 
wser.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
-
-                       if (rpd.isAsymmetricBinding() && cert == null && 
rpd.getInitiatorToken() != null
-                               && !rpd.getInitiatorToken().isDerivedKeys()) {
-
-                           // If symmetric binding is used, the certificate 
should be null.
-                           // If certificate is not null then probably 
initiator and
-                           // recipient are using 2 different bindings.
-                           throw new RampartException("invalidSignatureAlgo");
-                       }
-
-                       msgCtx.setProperty(RampartMessageData.X509_CERT, cert);
-                   }
-
-               }
-               }
+        for (int j = 0; j < results.size(); j++) {
+            WSSecurityEngineResult wser = (WSSecurityEngineResult) 
results.get(j);
+            final Integer actInt =
+                    (Integer) wser.get(WSSecurityEngineResult.TAG_ACTION);
+            if (WSConstants.ST_UNSIGNED == actInt.intValue()) {
+
+                Object samlAssertion = 
wser.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
+
+                SAMLAssertionHandler samlAssertionHandler
+                        = 
SAMLAssertionHandlerFactory.createAssertionHandler(samlAssertion);
+
+                if (samlAssertionHandler.isBearerAssertion()) {
+                    break;
+                }
+                //Store the token
+                try {
+                    TokenStorage store = rmd.getTokenStorage();
+                    if (store.getToken(samlAssertionHandler.getAssertionId()) 
== null) {
+                        Token token = new 
Token(samlAssertionHandler.getAssertionId(),
+                                samlAssertionHandler.getAssertionElement(),
+                                samlAssertionHandler.getDateNotBefore(),
+                                samlAssertionHandler.getDateNotOnOrAfter());
+
+                        token.setSecret(samlAssertionHandler.
+                                getAssertionKeyInfoSecret(signatureCrypto, 
tokenCallbackHandler));
+                        store.add(token);
+                    }
+                } catch (Exception e) {
+                    throw new RampartException(
+                            "errorInAddingTokenIntoStore", e);
+                }
+            } else if (WSConstants.UT == actInt) {
+
+                       WSUsernameTokenPrincipal userNameTokenPrincipal = 
(WSUsernameTokenPrincipal)wser.get(WSSecurityEngineResult.TAG_PRINCIPAL);
+
+                String username = userNameTokenPrincipal.getName();
+                msgCtx.setProperty(RampartMessageData.USERNAME, username);
+                
+                if (userNameTokenPrincipal.getNonce() != null) {
+                    // Check whether this is a replay attack. To verify that 
we need to check whether nonce value
+                    // is a repeating one
+                    int nonceLifeTimeInSeconds = 0;
+
+                    if (rpd.getRampartConfig() != null) {
+                        
+                        String stringLifeTime = 
rpd.getRampartConfig().getNonceLifeTime();
+
+                        try {
+                            nonceLifeTimeInSeconds = 
Integer.parseInt(stringLifeTime);
+
+                        } catch (NumberFormatException e) {
+                            log.error("Invalid value for nonceLifeTime in 
rampart configuration file.", e);
+                            throw new RampartException(
+                                        "invalidNonceLifeTime", e);
+
+                        }
+                    }
+
+                    String serviceEndpointName = 
msgCtx.getAxisService().getEndpointName();
+
+                    boolean valueRepeating = 
serviceNonceCache.isNonceRepeatingForService(serviceEndpointName, username, 
userNameTokenPrincipal.getNonce());
+
+                    if (valueRepeating){
+                        throw new RampartException("repeatingNonceValue", new 
Object[]{ userNameTokenPrincipal.getNonce(), username} );
+                    }
+
+                    serviceNonceCache.addNonceForService(serviceEndpointName, 
username, userNameTokenPrincipal.getNonce(), nonceLifeTimeInSeconds);
+                }
+            } else if (WSConstants.SIGN == actInt) {
+                X509Certificate cert = (X509Certificate) 
wser.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
+
+                if (rpd.isAsymmetricBinding() && cert == null && 
rpd.getInitiatorToken() != null
+                        && !rpd.getInitiatorToken().isDerivedKeys()) {
+
+                    // If symmetric binding is used, the certificate should be 
null.
+                    // If certificate is not null then probably initiator and
+                    // recipient are using 2 different bindings.
+                    throw new RampartException("invalidSignatureAlgo");
+                }
+
+                msgCtx.setProperty(RampartMessageData.X509_CERT, cert);
+            }
+
+        }
 
 
                SOAPEnvelope env = 
Axis2Util.getSOAPEnvelopeFromDOMDocument(rmd.getDocument(), true);

Reply via email to