processKerberosTokens(PolicyValidatorParameters, boolean) |  | 0% |  | 0% | 16 | 16 | 34 | 34 | 1 | 1 |
checkSignatureOrEncryptionResult(WSSecurityEngineResult, List) |  | 0% |  | 0% | 21 | 21 | 41 | 41 | 1 | 1 |
processX509Tokens(PolicyValidatorParameters, boolean) |  | 0% |  | 0% | 17 | 17 | 33 | 33 | 1 | 1 |
processSAMLTokens(PolicyValidatorParameters, boolean) |  | 0% |  | 0% | 15 | 15 | 31 | 31 | 1 | 1 |
processSCTokens(PolicyValidatorParameters, boolean) |  | 0% |  | 0% | 12 | 12 | 27 | 27 | 1 | 1 |
processUsernameTokens(PolicyValidatorParameters, boolean) |  | 0% |  | 0% | 15 | 15 | 27 | 27 | 1 | 1 |
validateSignedEncryptedParts(AbstractSecuredParts, boolean, List, List, Message) |  | 0% |  | 0% | 8 | 8 | 28 | 28 | 1 | 1 |
processKeyValueTokens(PolicyValidatorParameters) |  | 0% |  | 0% | 13 | 13 | 24 | 24 | 1 | 1 |
validateSignedEncryptedElements(RequiredElements, List, List, Message) |  | 0% |  | 0% | 8 | 8 | 23 | 23 | 1 | 1 |
isEncryptedTokenSigned(Element, WSDataRef, List) |  | 0% |  | 0% | 10 | 10 | 17 | 17 | 1 | 1 |
assertSecurePartsIfTokenNotRequired(SupportingTokens, AssertionInfoMap) |  | 0% |  | 0% | 5 | 5 | 10 | 10 | 1 | 1 |
checkProtectionResult(Element, boolean, List, List) |  | 0% |  | 0% | 7 | 7 | 13 | 13 | 1 | 1 |
checkSignatureIsSigned(List, List) |  | 0% |  | 0% | 7 | 7 | 12 | 12 | 1 | 1 |
checkXPathResult(Element, XPath, String, List, List) |  | 0% |  | 0% | 4 | 4 | 11 | 11 | 1 | 1 |
checkTimestampIsSigned(List, List, Element) |  | 0% |  | 0% | 6 | 6 | 11 | 11 | 1 | 1 |
isTokenSigned(Element, List, List) |  | 0% |  | 0% | 5 | 5 | 10 | 10 | 1 | 1 |
validateSignedEncryptedPolicies(List, List, List, Message) |  | 0% |  | 0% | 4 | 4 | 7 | 7 | 1 | 1 |
isTokenEncrypted(Element, List) |  | 0% |  | 0% | 5 | 5 | 10 | 10 | 1 | 1 |
isSamlTokenRequiredForIssuedToken(IssuedToken) |  | 0% |  | 0% | 6 | 6 | 10 | 10 | 1 | 1 |
getMatchingEncryptedKey(X509Certificate, WSHandlerResult) |  | 0% |  | 0% | 4 | 4 | 8 | 8 | 1 | 1 |
areTokensSigned(List, List, List, Message) |  | 0% |  | 0% | 5 | 5 | 8 | 8 | 1 | 1 |
areTokensEncrypted(List, List) |  | 0% |  | 0% | 5 | 5 | 7 | 7 | 1 | 1 |
assertSecurePartsIfTokenNotRequired(AbstractSecurityAssertion, QName, AssertionInfoMap) |  | 0% |  | 0% | 5 | 5 | 7 | 7 | 1 | 1 |
getMatchingDerivedKey(byte[], WSHandlerResult) |  | 0% |  | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
processX509DerivedTokenResult(WSSecurityEngineResult, WSHandlerResult) |  | 0% |  | 0% | 3 | 3 | 9 | 9 | 1 | 1 |
checkEndorsed(List, List, Message, Element) |  | 0% |  | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
assertDerivedKeys(AbstractToken, AssertionInfoMap) |  | 0% |  | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
isTLSInUse(Message) |  | 0% |  | 0% | 2 | 2 | 2 | 2 | 1 | 1 |
AbstractSupportingTokenPolicyValidator() |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
setSignedElements(SignedElements) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
setEncryptedElements(EncryptedElements) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
setSignedParts(SignedParts) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
setEncryptedParts(EncryptedParts) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
setEnforceEncryptedTokens(boolean) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
static {...} |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
isEnforceEncryptedTokens() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |