summaryrefslogtreecommitdiffstats
path: root/pki/base/common/src/com/netscape/cms
diff options
context:
space:
mode:
authorJack Magne <jmagne@redhat.com>2012-02-13 16:27:13 -0800
committerJack Magne <jmagne@redhat.com>2012-02-13 19:02:41 -0800
commit2f1ae9843d7239e970effa5e4692f3c4ab2eff6f (patch)
tree7ea9f519769ad7c13eeb06579092e5d766d1a3ac /pki/base/common/src/com/netscape/cms
parenta9680c7b7097c6b715c57c6581d4f24a5e4ee8b8 (diff)
downloadpki-2f1ae9843d7239e970effa5e4692f3c4ab2eff6f.tar.gz
pki-2f1ae9843d7239e970effa5e4692f3c4ab2eff6f.tar.xz
pki-2f1ae9843d7239e970effa5e4692f3c4ab2eff6f.zip
KRA symmetric key cmake support.
Changes to make the cmake build of this feature work. Change to the .classpath to allow the DRMTest.java test client to run under Eclipse, by adding additional jar paths to allow the client to run.
Diffstat (limited to 'pki/base/common/src/com/netscape/cms')
-rw-r--r--pki/base/common/src/com/netscape/cms/servlet/key/model/KeyDAO.java11
1 files changed, 4 insertions, 7 deletions
diff --git a/pki/base/common/src/com/netscape/cms/servlet/key/model/KeyDAO.java b/pki/base/common/src/com/netscape/cms/servlet/key/model/KeyDAO.java
index fd9d2d2c0..6a90a7c8f 100644
--- a/pki/base/common/src/com/netscape/cms/servlet/key/model/KeyDAO.java
+++ b/pki/base/common/src/com/netscape/cms/servlet/key/model/KeyDAO.java
@@ -23,8 +23,6 @@ import java.util.Enumeration;
import java.util.Hashtable;
import java.util.List;
-import javax.ws.rs.WebApplicationException;
-import javax.ws.rs.core.Response;
import javax.ws.rs.core.UriBuilder;
import javax.ws.rs.core.UriInfo;
import com.netscape.certsrv.apps.CMS;
@@ -37,7 +35,6 @@ import com.netscape.certsrv.request.IRequestQueue;
import com.netscape.certsrv.request.RequestId;
import com.netscape.certsrv.request.RequestStatus;
import com.netscape.cms.servlet.request.model.RecoveryRequestData;
-import com.netscape.kra.SecurityDataRecoveryService;
/**
* @author alee
@@ -116,8 +113,8 @@ public class KeyDAO {
throw new EBaseException("Can't obtain Volatile requestParams in KeyDAO.getKey!");
}
- String sessWrappedKeyData = (String) requestParams.get(SecurityDataRecoveryService.ATTR_SESS_WRAPPED_DATA);
- String passWrappedKeyData = (String) requestParams.get(SecurityDataRecoveryService.ATTR_PASS_WRAPPED_DATA);
+ String sessWrappedKeyData = (String) requestParams.get(IRequest.SECURITY_DATA_SESS_WRAPPED_DATA);
+ String passWrappedKeyData = (String) requestParams.get(IRequest.SECURITY_DATA_PASS_WRAPPED_DATA);
String nonceData = (String) requestParams.get(IRequest.SECURITY_DATA_IV_STRING_OUT);
if (sessWrappedKeyData != null || passWrappedKeyData != null) {
@@ -164,8 +161,8 @@ public class KeyDAO {
nonceData = null;
keyData = new KeyData();
- sessWrappedKeyData = (String) requestParams.get(SecurityDataRecoveryService.ATTR_SESS_WRAPPED_DATA);
- passWrappedKeyData = (String) requestParams.get(SecurityDataRecoveryService.ATTR_PASS_WRAPPED_DATA);
+ sessWrappedKeyData = (String) requestParams.get(IRequest.SECURITY_DATA_SESS_WRAPPED_DATA);
+ passWrappedKeyData = (String) requestParams.get(IRequest.SECURITY_DATA_PASS_WRAPPED_DATA);
nonceData = (String) requestParams.get(IRequest.SECURITY_DATA_IV_STRING_OUT);
}