You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ws.apache.org by co...@apache.org on 2011/10/03 17:16:11 UTC

svn commit: r1178426 [18/40] - in /webservices/wss4j/site: ./ apidocs/ apidocs/org/apache/ws/security/ apidocs/org/apache/ws/security/action/ apidocs/org/apache/ws/security/action/class-use/ apidocs/org/apache/ws/security/class-use/ apidocs/org/apache/...

Modified: webservices/wss4j/site/xref-test/org/apache/ws/security/message/EncryptionTest.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref-test/org/apache/ws/security/message/EncryptionTest.html?rev=1178426&r1=1178425&r2=1178426&view=diff
==============================================================================
--- webservices/wss4j/site/xref-test/org/apache/ws/security/message/EncryptionTest.html (original)
+++ webservices/wss4j/site/xref-test/org/apache/ws/security/message/EncryptionTest.html Mon Oct  3 15:15:52 2011
@@ -136,560 +136,561 @@
 <a name="126" href="#126">126</a> <em class="jxr_comment">         */</em>
 <a name="127" href="#127">127</a>         builder.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
 <a name="128" href="#128">128</a>         builder.setSymmetricEncAlgorithm(WSConstants.AES_128);
-<a name="129" href="#129">129</a>         java.util.List&lt;WSEncryptionPart&gt; parts = <strong class="jxr_keyword">new</strong> ArrayList&lt;WSEncryptionPart&gt;();
-<a name="130" href="#130">130</a>         WSEncryptionPart encP = 
-<a name="131" href="#131">131</a>             <strong class="jxr_keyword">new</strong> WSEncryptionPart(
-<a name="132" href="#132">132</a>                 <span class="jxr_string">"add"</span>, <span class="jxr_string">"http://ws.apache.org/counter/counter_port_type"</span>, <span class="jxr_string">"Element"</span>
-<a name="133" href="#133">133</a>             );
-<a name="134" href="#134">134</a>         parts.add(encP);
-<a name="135" href="#135">135</a>         builder.setParts(parts);
-<a name="136" href="#136">136</a>         doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="137" href="#137">137</a>         secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
-<a name="138" href="#138">138</a>         secHeader.insertSecurityHeader(doc);        
-<a name="139" href="#139">139</a>         LOG.info(<span class="jxr_string">"Before Encryption AES 128/RSA-15...."</span>);
-<a name="140" href="#140">140</a>         encryptedDoc = builder.build(doc, crypto, secHeader);
-<a name="141" href="#141">141</a>         LOG.info(<span class="jxr_string">"After Encryption AES 128/RSA-15...."</span>);
-<a name="142" href="#142">142</a>         outputString = 
-<a name="143" href="#143">143</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
-<a name="144" href="#144">144</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="145" href="#145">145</a>             LOG.debug(<span class="jxr_string">"Encrypted message, RSA-15 keytransport, AES 128:"</span>);
-<a name="146" href="#146">146</a>             LOG.debug(outputString);
-<a name="147" href="#147">147</a>         }
-<a name="148" href="#148">148</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"counter_port_type"</span>) == -1 ? <strong class="jxr_keyword">true</strong> : false);
-<a name="149" href="#149">149</a>         verify(
-<a name="150" href="#150">150</a>             encryptedDoc,
-<a name="151" href="#151">151</a>             keystoreCallbackHandler,
-<a name="152" href="#152">152</a>             <strong class="jxr_keyword">new</strong> javax.xml.namespace.QName(
-<a name="153" href="#153">153</a>                 <span class="jxr_string">"http://ws.apache.org/counter/counter_port_type"</span>,
-<a name="154" href="#154">154</a>                 <span class="jxr_string">"add"</span>
-<a name="155" href="#155">155</a>             )
-<a name="156" href="#156">156</a>         );
-<a name="157" href="#157">157</a>     }
-<a name="158" href="#158">158</a> 
-<a name="159" href="#159">159</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="160" href="#160">160</a> <em class="jxr_javadoccomment">     * Test that encrypt and decrypt a WS-Security envelope.</em>
-<a name="161" href="#161">161</a> <em class="jxr_javadoccomment">     * This test uses the RSA OAEP algorithm to transport (wrap) the symmetric</em>
-<a name="162" href="#162">162</a> <em class="jxr_javadoccomment">     * key.</em>
-<a name="163" href="#163">163</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a name="164" href="#164">164</a> <em class="jxr_javadoccomment">     * </em>
-<a name="165" href="#165">165</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is any problem in signing or verification</em>
-<a name="166" href="#166">166</a> <em class="jxr_javadoccomment">     */</em>
-<a name="167" href="#167">167</a>     @org.junit.Test
-<a name="168" href="#168">168</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionDecryptionOAEP() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="169" href="#169">169</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
-<a name="170" href="#170">170</a>         builder.setUserInfo(<span class="jxr_string">"wss40"</span>);
-<a name="171" href="#171">171</a>         builder.setKeyIdentifierType(WSConstants.X509_KEY_IDENTIFIER);
-<a name="172" href="#172">172</a>         builder.setKeyEnc(WSConstants.KEYTRANSPORT_RSAOEP);
-<a name="173" href="#173">173</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="174" href="#174">174</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
-<a name="175" href="#175">175</a>         secHeader.insertSecurityHeader(doc);        
-<a name="176" href="#176">176</a>         LOG.info(<span class="jxr_string">"Before Encryption Triple DES/RSA-OAEP...."</span>);
-<a name="177" href="#177">177</a>         Document encryptedDoc = builder.build(doc, crypto, secHeader);
-<a name="178" href="#178">178</a>         LOG.info(<span class="jxr_string">"After Encryption Triple DES/RSA-OAEP...."</span>);
-<a name="179" href="#179">179</a> 
-<a name="180" href="#180">180</a>         String outputString = 
-<a name="181" href="#181">181</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
-<a name="182" href="#182">182</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="183" href="#183">183</a>             LOG.debug(<span class="jxr_string">"Encrypted message, RSA-OAEP keytransport, 3DES:"</span>);
-<a name="184" href="#184">184</a>             LOG.debug(outputString);
-<a name="185" href="#185">185</a>         }
-<a name="186" href="#186">186</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"counter_port_type"</span>) == -1 ? <strong class="jxr_keyword">true</strong> : false);
-<a name="187" href="#187">187</a>         
-<a name="188" href="#188">188</a>         <em class="jxr_comment">// Turn off BSP spec compliance</em>
-<a name="189" href="#189">189</a>         WSSecurityEngine newEngine = <strong class="jxr_keyword">new</strong> WSSecurityEngine();
-<a name="190" href="#190">190</a>         WSSConfig config = WSSConfig.getNewInstance();
-<a name="191" href="#191">191</a>         config.setWsiBSPCompliant(false);
-<a name="192" href="#192">192</a>         newEngine.setWssConfig(config);
-<a name="193" href="#193">193</a>         newEngine.processSecurityHeader(encryptedDoc, <strong class="jxr_keyword">null</strong>, keystoreCallbackHandler, crypto);
-<a name="194" href="#194">194</a>         
-<a name="195" href="#195">195</a>         <em class="jxr_comment">// Now turn on BSP spec compliance</em>
-<a name="196" href="#196">196</a>         config.setWsiBSPCompliant(<strong class="jxr_keyword">true</strong>);
-<a name="197" href="#197">197</a>         newEngine.setWssConfig(config);
-<a name="198" href="#198">198</a>         <strong class="jxr_keyword">try</strong> {
-<a name="199" href="#199">199</a>             newEngine.processSecurityHeader(encryptedDoc, <strong class="jxr_keyword">null</strong>, keystoreCallbackHandler, crypto);
-<a name="200" href="#200">200</a>             fail(<span class="jxr_string">"Failure expected on a bad ValueType attribute"</span>);
-<a name="201" href="#201">201</a>         } <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) {
-<a name="202" href="#202">202</a>             <em class="jxr_comment">// expected</em>
-<a name="203" href="#203">203</a>         }
-<a name="204" href="#204">204</a> 
-<a name="205" href="#205">205</a>     }
-<a name="206" href="#206">206</a>     
-<a name="207" href="#207">207</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="208" href="#208">208</a> <em class="jxr_javadoccomment">     * Test that encrypt and then again encrypts (Super encryption) WS-Security</em>
-<a name="209" href="#209">209</a> <em class="jxr_javadoccomment">     * envelope and then verifies it &lt;p/&gt;</em>
-<a name="210" href="#210">210</a> <em class="jxr_javadoccomment">     * </em>
-<a name="211" href="#211">211</a> <em class="jxr_javadoccomment">     * @throws Exception</em>
-<a name="212" href="#212">212</a> <em class="jxr_javadoccomment">     *             Thrown when there is any problem in encryption or</em>
-<a name="213" href="#213">213</a> <em class="jxr_javadoccomment">     *             verification</em>
-<a name="214" href="#214">214</a> <em class="jxr_javadoccomment">     */</em>
-<a name="215" href="#215">215</a>     @org.junit.Test
-<a name="216" href="#216">216</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionEncryption() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="217" href="#217">217</a>         Crypto encCrypto = CryptoFactory.getInstance();
-<a name="218" href="#218">218</a>         WSSecEncrypt encrypt = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
-<a name="219" href="#219">219</a>         encrypt.setUserInfo(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>);
-<a name="220" href="#220">220</a>         LOG.info(<span class="jxr_string">"Before Encryption...."</span>);
-<a name="221" href="#221">221</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="222" href="#222">222</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
-<a name="223" href="#223">223</a>         secHeader.insertSecurityHeader(doc);
-<a name="224" href="#224">224</a> 
-<a name="225" href="#225">225</a>         Document encryptedDoc = encrypt.build(doc, encCrypto, secHeader);
-<a name="226" href="#226">226</a>         
-<a name="227" href="#227">227</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="228" href="#228">228</a>             LOG.debug(<span class="jxr_string">"After the first encryption:"</span>);
-<a name="229" href="#229">229</a>             String outputString = 
-<a name="230" href="#230">230</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
-<a name="231" href="#231">231</a>             LOG.debug(outputString);
-<a name="232" href="#232">232</a>         }
-<a name="233" href="#233">233</a>         
-<a name="234" href="#234">234</a>         Document encryptedEncryptedDoc = encrypt.build(encryptedDoc, encCrypto, secHeader);
-<a name="235" href="#235">235</a>         
-<a name="236" href="#236">236</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="237" href="#237">237</a>             LOG.debug(<span class="jxr_string">"After the second encryption:"</span>);
-<a name="238" href="#238">238</a>             String outputString = 
-<a name="239" href="#239">239</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedEncryptedDoc);
-<a name="240" href="#240">240</a>             LOG.debug(outputString);
-<a name="241" href="#241">241</a>         }
-<a name="242" href="#242">242</a> 
-<a name="243" href="#243">243</a>         LOG.info(<span class="jxr_string">"After Encryption...."</span>);
-<a name="244" href="#244">244</a>         verify(encryptedEncryptedDoc, encCrypto, keystoreCallbackHandler);
-<a name="245" href="#245">245</a>     }
-<a name="246" href="#246">246</a>     
-<a name="247" href="#247">247</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="248" href="#248">248</a> <em class="jxr_javadoccomment">     * Test that encrypts and decrypts a WS-Security envelope.</em>
-<a name="249" href="#249">249</a> <em class="jxr_javadoccomment">     * The test uses the ThumbprintSHA1 key identifier type. </em>
-<a name="250" href="#250">250</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a name="251" href="#251">251</a> <em class="jxr_javadoccomment">     * </em>
-<a name="252" href="#252">252</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is any problem in encryption or decryption</em>
-<a name="253" href="#253">253</a> <em class="jxr_javadoccomment">     */</em>
-<a name="254" href="#254">254</a>     @org.junit.Test
-<a name="255" href="#255">255</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testX509EncryptionThumb() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="256" href="#256">256</a>         Crypto encCrypto = CryptoFactory.getInstance();
-<a name="257" href="#257">257</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
-<a name="258" href="#258">258</a>         builder.setUserInfo(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>, <span class="jxr_string">"security"</span>);
-<a name="259" href="#259">259</a>         builder.setKeyIdentifierType(WSConstants.THUMBPRINT_IDENTIFIER);
-<a name="260" href="#260">260</a>         
-<a name="261" href="#261">261</a>         LOG.info(<span class="jxr_string">"Before Encrypting ThumbprintSHA1...."</span>);
-<a name="262" href="#262">262</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="263" href="#263">263</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
-<a name="264" href="#264">264</a>         secHeader.insertSecurityHeader(doc);        
-<a name="265" href="#265">265</a>         Document encryptedDoc = builder.build(doc, encCrypto, secHeader);
-<a name="266" href="#266">266</a>         
-<a name="267" href="#267">267</a>         String outputString = 
-<a name="268" href="#268">268</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
-<a name="269" href="#269">269</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="270" href="#270">270</a>             LOG.debug(<span class="jxr_string">"Encrypted message with THUMBPRINT_IDENTIFIER:"</span>);
-<a name="271" href="#271">271</a>             LOG.debug(outputString);
-<a name="272" href="#272">272</a>         }
-<a name="273" href="#273">273</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"#ThumbprintSHA1"</span>) != -1);
-<a name="274" href="#274">274</a>     
-<a name="275" href="#275">275</a>         LOG.info(<span class="jxr_string">"After Encrypting ThumbprintSHA1...."</span>);
-<a name="276" href="#276">276</a>         verify(encryptedDoc, encCrypto, keystoreCallbackHandler);
-<a name="277" href="#277">277</a>     }
-<a name="278" href="#278">278</a>     
-<a name="279" href="#279">279</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="280" href="#280">280</a> <em class="jxr_javadoccomment">     * Test that encrypts and decrypts a WS-Security envelope.</em>
-<a name="281" href="#281">281</a> <em class="jxr_javadoccomment">     * The test uses the EncryptedKeySHA1 key identifier type. </em>
-<a name="282" href="#282">282</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a name="283" href="#283">283</a> <em class="jxr_javadoccomment">     * </em>
-<a name="284" href="#284">284</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is any problem in encryption or decryption</em>
-<a name="285" href="#285">285</a> <em class="jxr_javadoccomment">     */</em>
-<a name="286" href="#286">286</a>     @org.junit.Test
-<a name="287" href="#287">287</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testX509EncryptionSHA1() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="288" href="#288">288</a>         Crypto encCrypto = CryptoFactory.getInstance();
-<a name="289" href="#289">289</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
-<a name="290" href="#290">290</a>         builder.setUserInfo(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>, <span class="jxr_string">"security"</span>);
-<a name="291" href="#291">291</a>         builder.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER);
-<a name="292" href="#292">292</a>      
-<a name="293" href="#293">293</a>         LOG.info(<span class="jxr_string">"Before Encrypting EncryptedKeySHA1...."</span>);
-<a name="294" href="#294">294</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="295" href="#295">295</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
-<a name="296" href="#296">296</a>         secHeader.insertSecurityHeader(doc);        
-<a name="297" href="#297">297</a>         Document encryptedDoc = builder.build(doc, encCrypto, secHeader);
-<a name="298" href="#298">298</a>      
-<a name="299" href="#299">299</a>         String outputString = 
-<a name="300" href="#300">300</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
-<a name="301" href="#301">301</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="302" href="#302">302</a>             LOG.debug(<span class="jxr_string">"Encrypted message with ENCRYPTED_KEY_SHA1_IDENTIFIER:"</span>);
-<a name="303" href="#303">303</a>             LOG.debug(outputString);
-<a name="304" href="#304">304</a>         }
-<a name="305" href="#305">305</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"#EncryptedKeySHA1"</span>) != -1);
-<a name="306" href="#306">306</a>      
-<a name="307" href="#307">307</a>         LOG.info(<span class="jxr_string">"After Encrypting EncryptedKeySHA1...."</span>);
-<a name="308" href="#308">308</a>         verify(encryptedDoc, encCrypto, keystoreCallbackHandler);
-<a name="309" href="#309">309</a>     }
-<a name="310" href="#310">310</a>     
-<a name="311" href="#311">311</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="312" href="#312">312</a> <em class="jxr_javadoccomment">     * Test that encrypts using EncryptedKeySHA1, where it uses a symmetric key, rather than a </em>
-<a name="313" href="#313">313</a> <em class="jxr_javadoccomment">     * generated session key which is then encrypted using a public key.</em>
-<a name="314" href="#314">314</a> <em class="jxr_javadoccomment">     * </em>
-<a name="315" href="#315">315</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is any problem in encryption or decryption</em>
-<a name="316" href="#316">316</a> <em class="jxr_javadoccomment">     */</em>
-<a name="317" href="#317">317</a>     @org.junit.Test
-<a name="318" href="#318">318</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionSHA1Symmetric() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="319" href="#319">319</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
-<a name="320" href="#320">320</a>         builder.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER);
-<a name="321" href="#321">321</a>         builder.setSymmetricKey(key);
-<a name="322" href="#322">322</a>         builder.setEncryptSymmKey(false);
-<a name="323" href="#323">323</a>         
-<a name="324" href="#324">324</a>         LOG.info(<span class="jxr_string">"Before Encrypting EncryptedKeySHA1...."</span>);
-<a name="325" href="#325">325</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="326" href="#326">326</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
-<a name="327" href="#327">327</a>         secHeader.insertSecurityHeader(doc);
-<a name="328" href="#328">328</a>         Document encryptedDoc = builder.build(doc, crypto, secHeader);
-<a name="329" href="#329">329</a>         
-<a name="330" href="#330">330</a>         byte[] encodedBytes = WSSecurityUtil.generateDigest(keyData);
-<a name="331" href="#331">331</a>         String identifier = Base64.encode(encodedBytes);
-<a name="332" href="#332">332</a>         secretKeyCallbackHandler.addSecretKey(identifier, keyData);
-<a name="333" href="#333">333</a>      
-<a name="334" href="#334">334</a>         String outputString = 
-<a name="335" href="#335">335</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
-<a name="336" href="#336">336</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="337" href="#337">337</a>             LOG.debug(<span class="jxr_string">"Encrypted message with ENCRYPTED_KEY_SHA1_IDENTIFIER:"</span>);
-<a name="338" href="#338">338</a>             LOG.debug(outputString);
-<a name="339" href="#339">339</a>         }
-<a name="340" href="#340">340</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"#EncryptedKeySHA1"</span>) != -1);
-<a name="341" href="#341">341</a>      
-<a name="342" href="#342">342</a>         LOG.info(<span class="jxr_string">"After Encrypting EncryptedKeySHA1...."</span>);
-<a name="343" href="#343">343</a>         verify(encryptedDoc, (Crypto)<strong class="jxr_keyword">null</strong>, secretKeyCallbackHandler);
-<a name="344" href="#344">344</a>     }
-<a name="345" href="#345">345</a>     
-<a name="346" href="#346">346</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="347" href="#347">347</a> <em class="jxr_javadoccomment">     * Test that encrypts using EncryptedKeySHA1, where it uses a symmetric key (bytes), </em>
-<a name="348" href="#348">348</a> <em class="jxr_javadoccomment">     * rather than a generated session key which is then encrypted using a public key.</em>
-<a name="349" href="#349">349</a> <em class="jxr_javadoccomment">     * </em>
-<a name="350" href="#350">350</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is any problem in encryption or decryption</em>
-<a name="351" href="#351">351</a> <em class="jxr_javadoccomment">     */</em>
-<a name="352" href="#352">352</a>     @org.junit.Test
-<a name="353" href="#353">353</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionSHA1SymmetricBytes() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="354" href="#354">354</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
-<a name="355" href="#355">355</a>         builder.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER);
-<a name="356" href="#356">356</a>         builder.setEphemeralKey(keyData);
-<a name="357" href="#357">357</a>         builder.setEncryptSymmKey(false);
-<a name="358" href="#358">358</a>         
-<a name="359" href="#359">359</a>         LOG.info(<span class="jxr_string">"Before Encrypting EncryptedKeySHA1...."</span>);
-<a name="360" href="#360">360</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="361" href="#361">361</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
-<a name="362" href="#362">362</a>         secHeader.insertSecurityHeader(doc);        
-<a name="363" href="#363">363</a>         Document encryptedDoc = builder.build(doc, crypto, secHeader);
-<a name="364" href="#364">364</a>         
-<a name="365" href="#365">365</a>         byte[] encodedBytes = WSSecurityUtil.generateDigest(keyData);
-<a name="366" href="#366">366</a>         String identifier = Base64.encode(encodedBytes);
-<a name="367" href="#367">367</a>         secretKeyCallbackHandler.addSecretKey(identifier, keyData);
-<a name="368" href="#368">368</a>      
-<a name="369" href="#369">369</a>         String outputString = 
-<a name="370" href="#370">370</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
-<a name="371" href="#371">371</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="372" href="#372">372</a>             LOG.debug(<span class="jxr_string">"Encrypted message with ENCRYPTED_KEY_SHA1_IDENTIFIER:"</span>);
-<a name="373" href="#373">373</a>             LOG.debug(outputString);
-<a name="374" href="#374">374</a>         }
-<a name="375" href="#375">375</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"#EncryptedKeySHA1"</span>) != -1);
-<a name="376" href="#376">376</a>      
-<a name="377" href="#377">377</a>         LOG.info(<span class="jxr_string">"After Encrypting EncryptedKeySHA1...."</span>);
-<a name="378" href="#378">378</a>         verify(encryptedDoc, crypto, secretKeyCallbackHandler);
-<a name="379" href="#379">379</a>     }
-<a name="380" href="#380">380</a>     
+<a name="129" href="#129">129</a>         builder.setSymmetricKey(<strong class="jxr_keyword">null</strong>);
+<a name="130" href="#130">130</a>         java.util.List&lt;WSEncryptionPart&gt; parts = <strong class="jxr_keyword">new</strong> ArrayList&lt;WSEncryptionPart&gt;();
+<a name="131" href="#131">131</a>         WSEncryptionPart encP = 
+<a name="132" href="#132">132</a>             <strong class="jxr_keyword">new</strong> WSEncryptionPart(
+<a name="133" href="#133">133</a>                 <span class="jxr_string">"add"</span>, <span class="jxr_string">"http://ws.apache.org/counter/counter_port_type"</span>, <span class="jxr_string">"Element"</span>
+<a name="134" href="#134">134</a>             );
+<a name="135" href="#135">135</a>         parts.add(encP);
+<a name="136" href="#136">136</a>         builder.setParts(parts);
+<a name="137" href="#137">137</a>         doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="138" href="#138">138</a>         secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="139" href="#139">139</a>         secHeader.insertSecurityHeader(doc);        
+<a name="140" href="#140">140</a>         LOG.info(<span class="jxr_string">"Before Encryption AES 128/RSA-15...."</span>);
+<a name="141" href="#141">141</a>         encryptedDoc = builder.build(doc, crypto, secHeader);
+<a name="142" href="#142">142</a>         LOG.info(<span class="jxr_string">"After Encryption AES 128/RSA-15...."</span>);
+<a name="143" href="#143">143</a>         outputString = 
+<a name="144" href="#144">144</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
+<a name="145" href="#145">145</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="146" href="#146">146</a>             LOG.debug(<span class="jxr_string">"Encrypted message, RSA-15 keytransport, AES 128:"</span>);
+<a name="147" href="#147">147</a>             LOG.debug(outputString);
+<a name="148" href="#148">148</a>         }
+<a name="149" href="#149">149</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"counter_port_type"</span>) == -1 ? <strong class="jxr_keyword">true</strong> : false);
+<a name="150" href="#150">150</a>         verify(
+<a name="151" href="#151">151</a>             encryptedDoc,
+<a name="152" href="#152">152</a>             keystoreCallbackHandler,
+<a name="153" href="#153">153</a>             <strong class="jxr_keyword">new</strong> javax.xml.namespace.QName(
+<a name="154" href="#154">154</a>                 <span class="jxr_string">"http://ws.apache.org/counter/counter_port_type"</span>,
+<a name="155" href="#155">155</a>                 <span class="jxr_string">"add"</span>
+<a name="156" href="#156">156</a>             )
+<a name="157" href="#157">157</a>         );
+<a name="158" href="#158">158</a>     }
+<a name="159" href="#159">159</a> 
+<a name="160" href="#160">160</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="161" href="#161">161</a> <em class="jxr_javadoccomment">     * Test that encrypt and decrypt a WS-Security envelope.</em>
+<a name="162" href="#162">162</a> <em class="jxr_javadoccomment">     * This test uses the RSA OAEP algorithm to transport (wrap) the symmetric</em>
+<a name="163" href="#163">163</a> <em class="jxr_javadoccomment">     * key.</em>
+<a name="164" href="#164">164</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="165" href="#165">165</a> <em class="jxr_javadoccomment">     * </em>
+<a name="166" href="#166">166</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is any problem in signing or verification</em>
+<a name="167" href="#167">167</a> <em class="jxr_javadoccomment">     */</em>
+<a name="168" href="#168">168</a>     @org.junit.Test
+<a name="169" href="#169">169</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionDecryptionOAEP() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="170" href="#170">170</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
+<a name="171" href="#171">171</a>         builder.setUserInfo(<span class="jxr_string">"wss40"</span>);
+<a name="172" href="#172">172</a>         builder.setKeyIdentifierType(WSConstants.X509_KEY_IDENTIFIER);
+<a name="173" href="#173">173</a>         builder.setKeyEnc(WSConstants.KEYTRANSPORT_RSAOEP);
+<a name="174" href="#174">174</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="175" href="#175">175</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="176" href="#176">176</a>         secHeader.insertSecurityHeader(doc);        
+<a name="177" href="#177">177</a>         LOG.info(<span class="jxr_string">"Before Encryption Triple DES/RSA-OAEP...."</span>);
+<a name="178" href="#178">178</a>         Document encryptedDoc = builder.build(doc, crypto, secHeader);
+<a name="179" href="#179">179</a>         LOG.info(<span class="jxr_string">"After Encryption Triple DES/RSA-OAEP...."</span>);
+<a name="180" href="#180">180</a> 
+<a name="181" href="#181">181</a>         String outputString = 
+<a name="182" href="#182">182</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
+<a name="183" href="#183">183</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="184" href="#184">184</a>             LOG.debug(<span class="jxr_string">"Encrypted message, RSA-OAEP keytransport, 3DES:"</span>);
+<a name="185" href="#185">185</a>             LOG.debug(outputString);
+<a name="186" href="#186">186</a>         }
+<a name="187" href="#187">187</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"counter_port_type"</span>) == -1 ? <strong class="jxr_keyword">true</strong> : false);
+<a name="188" href="#188">188</a>         
+<a name="189" href="#189">189</a>         <em class="jxr_comment">// Turn off BSP spec compliance</em>
+<a name="190" href="#190">190</a>         WSSecurityEngine newEngine = <strong class="jxr_keyword">new</strong> WSSecurityEngine();
+<a name="191" href="#191">191</a>         WSSConfig config = WSSConfig.getNewInstance();
+<a name="192" href="#192">192</a>         config.setWsiBSPCompliant(false);
+<a name="193" href="#193">193</a>         newEngine.setWssConfig(config);
+<a name="194" href="#194">194</a>         newEngine.processSecurityHeader(encryptedDoc, <strong class="jxr_keyword">null</strong>, keystoreCallbackHandler, crypto);
+<a name="195" href="#195">195</a>         
+<a name="196" href="#196">196</a>         <em class="jxr_comment">// Now turn on BSP spec compliance</em>
+<a name="197" href="#197">197</a>         config.setWsiBSPCompliant(<strong class="jxr_keyword">true</strong>);
+<a name="198" href="#198">198</a>         newEngine.setWssConfig(config);
+<a name="199" href="#199">199</a>         <strong class="jxr_keyword">try</strong> {
+<a name="200" href="#200">200</a>             newEngine.processSecurityHeader(encryptedDoc, <strong class="jxr_keyword">null</strong>, keystoreCallbackHandler, crypto);
+<a name="201" href="#201">201</a>             fail(<span class="jxr_string">"Failure expected on a bad ValueType attribute"</span>);
+<a name="202" href="#202">202</a>         } <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) {
+<a name="203" href="#203">203</a>             <em class="jxr_comment">// expected</em>
+<a name="204" href="#204">204</a>         }
+<a name="205" href="#205">205</a> 
+<a name="206" href="#206">206</a>     }
+<a name="207" href="#207">207</a>     
+<a name="208" href="#208">208</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="209" href="#209">209</a> <em class="jxr_javadoccomment">     * Test that encrypt and then again encrypts (Super encryption) WS-Security</em>
+<a name="210" href="#210">210</a> <em class="jxr_javadoccomment">     * envelope and then verifies it &lt;p/&gt;</em>
+<a name="211" href="#211">211</a> <em class="jxr_javadoccomment">     * </em>
+<a name="212" href="#212">212</a> <em class="jxr_javadoccomment">     * @throws Exception</em>
+<a name="213" href="#213">213</a> <em class="jxr_javadoccomment">     *             Thrown when there is any problem in encryption or</em>
+<a name="214" href="#214">214</a> <em class="jxr_javadoccomment">     *             verification</em>
+<a name="215" href="#215">215</a> <em class="jxr_javadoccomment">     */</em>
+<a name="216" href="#216">216</a>     @org.junit.Test
+<a name="217" href="#217">217</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionEncryption() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="218" href="#218">218</a>         Crypto encCrypto = CryptoFactory.getInstance();
+<a name="219" href="#219">219</a>         WSSecEncrypt encrypt = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
+<a name="220" href="#220">220</a>         encrypt.setUserInfo(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>);
+<a name="221" href="#221">221</a>         LOG.info(<span class="jxr_string">"Before Encryption...."</span>);
+<a name="222" href="#222">222</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="223" href="#223">223</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="224" href="#224">224</a>         secHeader.insertSecurityHeader(doc);
+<a name="225" href="#225">225</a> 
+<a name="226" href="#226">226</a>         Document encryptedDoc = encrypt.build(doc, encCrypto, secHeader);
+<a name="227" href="#227">227</a>         
+<a name="228" href="#228">228</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="229" href="#229">229</a>             LOG.debug(<span class="jxr_string">"After the first encryption:"</span>);
+<a name="230" href="#230">230</a>             String outputString = 
+<a name="231" href="#231">231</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
+<a name="232" href="#232">232</a>             LOG.debug(outputString);
+<a name="233" href="#233">233</a>         }
+<a name="234" href="#234">234</a>         
+<a name="235" href="#235">235</a>         Document encryptedEncryptedDoc = encrypt.build(encryptedDoc, encCrypto, secHeader);
+<a name="236" href="#236">236</a>         
+<a name="237" href="#237">237</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="238" href="#238">238</a>             LOG.debug(<span class="jxr_string">"After the second encryption:"</span>);
+<a name="239" href="#239">239</a>             String outputString = 
+<a name="240" href="#240">240</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedEncryptedDoc);
+<a name="241" href="#241">241</a>             LOG.debug(outputString);
+<a name="242" href="#242">242</a>         }
+<a name="243" href="#243">243</a> 
+<a name="244" href="#244">244</a>         LOG.info(<span class="jxr_string">"After Encryption...."</span>);
+<a name="245" href="#245">245</a>         verify(encryptedEncryptedDoc, encCrypto, keystoreCallbackHandler);
+<a name="246" href="#246">246</a>     }
+<a name="247" href="#247">247</a>     
+<a name="248" href="#248">248</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="249" href="#249">249</a> <em class="jxr_javadoccomment">     * Test that encrypts and decrypts a WS-Security envelope.</em>
+<a name="250" href="#250">250</a> <em class="jxr_javadoccomment">     * The test uses the ThumbprintSHA1 key identifier type. </em>
+<a name="251" href="#251">251</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="252" href="#252">252</a> <em class="jxr_javadoccomment">     * </em>
+<a name="253" href="#253">253</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is any problem in encryption or decryption</em>
+<a name="254" href="#254">254</a> <em class="jxr_javadoccomment">     */</em>
+<a name="255" href="#255">255</a>     @org.junit.Test
+<a name="256" href="#256">256</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testX509EncryptionThumb() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="257" href="#257">257</a>         Crypto encCrypto = CryptoFactory.getInstance();
+<a name="258" href="#258">258</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
+<a name="259" href="#259">259</a>         builder.setUserInfo(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>, <span class="jxr_string">"security"</span>);
+<a name="260" href="#260">260</a>         builder.setKeyIdentifierType(WSConstants.THUMBPRINT_IDENTIFIER);
+<a name="261" href="#261">261</a>         
+<a name="262" href="#262">262</a>         LOG.info(<span class="jxr_string">"Before Encrypting ThumbprintSHA1...."</span>);
+<a name="263" href="#263">263</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="264" href="#264">264</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="265" href="#265">265</a>         secHeader.insertSecurityHeader(doc);        
+<a name="266" href="#266">266</a>         Document encryptedDoc = builder.build(doc, encCrypto, secHeader);
+<a name="267" href="#267">267</a>         
+<a name="268" href="#268">268</a>         String outputString = 
+<a name="269" href="#269">269</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
+<a name="270" href="#270">270</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="271" href="#271">271</a>             LOG.debug(<span class="jxr_string">"Encrypted message with THUMBPRINT_IDENTIFIER:"</span>);
+<a name="272" href="#272">272</a>             LOG.debug(outputString);
+<a name="273" href="#273">273</a>         }
+<a name="274" href="#274">274</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"#ThumbprintSHA1"</span>) != -1);
+<a name="275" href="#275">275</a>     
+<a name="276" href="#276">276</a>         LOG.info(<span class="jxr_string">"After Encrypting ThumbprintSHA1...."</span>);
+<a name="277" href="#277">277</a>         verify(encryptedDoc, encCrypto, keystoreCallbackHandler);
+<a name="278" href="#278">278</a>     }
+<a name="279" href="#279">279</a>     
+<a name="280" href="#280">280</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="281" href="#281">281</a> <em class="jxr_javadoccomment">     * Test that encrypts and decrypts a WS-Security envelope.</em>
+<a name="282" href="#282">282</a> <em class="jxr_javadoccomment">     * The test uses the EncryptedKeySHA1 key identifier type. </em>
+<a name="283" href="#283">283</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="284" href="#284">284</a> <em class="jxr_javadoccomment">     * </em>
+<a name="285" href="#285">285</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is any problem in encryption or decryption</em>
+<a name="286" href="#286">286</a> <em class="jxr_javadoccomment">     */</em>
+<a name="287" href="#287">287</a>     @org.junit.Test
+<a name="288" href="#288">288</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testX509EncryptionSHA1() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="289" href="#289">289</a>         Crypto encCrypto = CryptoFactory.getInstance();
+<a name="290" href="#290">290</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
+<a name="291" href="#291">291</a>         builder.setUserInfo(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>, <span class="jxr_string">"security"</span>);
+<a name="292" href="#292">292</a>         builder.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER);
+<a name="293" href="#293">293</a>      
+<a name="294" href="#294">294</a>         LOG.info(<span class="jxr_string">"Before Encrypting EncryptedKeySHA1...."</span>);
+<a name="295" href="#295">295</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="296" href="#296">296</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="297" href="#297">297</a>         secHeader.insertSecurityHeader(doc);        
+<a name="298" href="#298">298</a>         Document encryptedDoc = builder.build(doc, encCrypto, secHeader);
+<a name="299" href="#299">299</a>      
+<a name="300" href="#300">300</a>         String outputString = 
+<a name="301" href="#301">301</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
+<a name="302" href="#302">302</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="303" href="#303">303</a>             LOG.debug(<span class="jxr_string">"Encrypted message with ENCRYPTED_KEY_SHA1_IDENTIFIER:"</span>);
+<a name="304" href="#304">304</a>             LOG.debug(outputString);
+<a name="305" href="#305">305</a>         }
+<a name="306" href="#306">306</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"#EncryptedKeySHA1"</span>) != -1);
+<a name="307" href="#307">307</a>      
+<a name="308" href="#308">308</a>         LOG.info(<span class="jxr_string">"After Encrypting EncryptedKeySHA1...."</span>);
+<a name="309" href="#309">309</a>         verify(encryptedDoc, encCrypto, keystoreCallbackHandler);
+<a name="310" href="#310">310</a>     }
+<a name="311" href="#311">311</a>     
+<a name="312" href="#312">312</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="313" href="#313">313</a> <em class="jxr_javadoccomment">     * Test that encrypts using EncryptedKeySHA1, where it uses a symmetric key, rather than a </em>
+<a name="314" href="#314">314</a> <em class="jxr_javadoccomment">     * generated session key which is then encrypted using a public key.</em>
+<a name="315" href="#315">315</a> <em class="jxr_javadoccomment">     * </em>
+<a name="316" href="#316">316</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is any problem in encryption or decryption</em>
+<a name="317" href="#317">317</a> <em class="jxr_javadoccomment">     */</em>
+<a name="318" href="#318">318</a>     @org.junit.Test
+<a name="319" href="#319">319</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionSHA1Symmetric() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="320" href="#320">320</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
+<a name="321" href="#321">321</a>         builder.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER);
+<a name="322" href="#322">322</a>         builder.setSymmetricKey(key);
+<a name="323" href="#323">323</a>         builder.setEncryptSymmKey(false);
+<a name="324" href="#324">324</a>         
+<a name="325" href="#325">325</a>         LOG.info(<span class="jxr_string">"Before Encrypting EncryptedKeySHA1...."</span>);
+<a name="326" href="#326">326</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="327" href="#327">327</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="328" href="#328">328</a>         secHeader.insertSecurityHeader(doc);
+<a name="329" href="#329">329</a>         Document encryptedDoc = builder.build(doc, crypto, secHeader);
+<a name="330" href="#330">330</a>         
+<a name="331" href="#331">331</a>         byte[] encodedBytes = WSSecurityUtil.generateDigest(keyData);
+<a name="332" href="#332">332</a>         String identifier = Base64.encode(encodedBytes);
+<a name="333" href="#333">333</a>         secretKeyCallbackHandler.addSecretKey(identifier, keyData);
+<a name="334" href="#334">334</a>      
+<a name="335" href="#335">335</a>         String outputString = 
+<a name="336" href="#336">336</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
+<a name="337" href="#337">337</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="338" href="#338">338</a>             LOG.debug(<span class="jxr_string">"Encrypted message with ENCRYPTED_KEY_SHA1_IDENTIFIER:"</span>);
+<a name="339" href="#339">339</a>             LOG.debug(outputString);
+<a name="340" href="#340">340</a>         }
+<a name="341" href="#341">341</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"#EncryptedKeySHA1"</span>) != -1);
+<a name="342" href="#342">342</a>      
+<a name="343" href="#343">343</a>         LOG.info(<span class="jxr_string">"After Encrypting EncryptedKeySHA1...."</span>);
+<a name="344" href="#344">344</a>         verify(encryptedDoc, (Crypto)<strong class="jxr_keyword">null</strong>, secretKeyCallbackHandler);
+<a name="345" href="#345">345</a>     }
+<a name="346" href="#346">346</a>     
+<a name="347" href="#347">347</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="348" href="#348">348</a> <em class="jxr_javadoccomment">     * Test that encrypts using EncryptedKeySHA1, where it uses a symmetric key (bytes), </em>
+<a name="349" href="#349">349</a> <em class="jxr_javadoccomment">     * rather than a generated session key which is then encrypted using a public key.</em>
+<a name="350" href="#350">350</a> <em class="jxr_javadoccomment">     * </em>
+<a name="351" href="#351">351</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is any problem in encryption or decryption</em>
+<a name="352" href="#352">352</a> <em class="jxr_javadoccomment">     */</em>
+<a name="353" href="#353">353</a>     @org.junit.Test
+<a name="354" href="#354">354</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionSHA1SymmetricBytes() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="355" href="#355">355</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
+<a name="356" href="#356">356</a>         builder.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER);
+<a name="357" href="#357">357</a>         builder.setEphemeralKey(keyData);
+<a name="358" href="#358">358</a>         builder.setEncryptSymmKey(false);
+<a name="359" href="#359">359</a>         
+<a name="360" href="#360">360</a>         LOG.info(<span class="jxr_string">"Before Encrypting EncryptedKeySHA1...."</span>);
+<a name="361" href="#361">361</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="362" href="#362">362</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="363" href="#363">363</a>         secHeader.insertSecurityHeader(doc);        
+<a name="364" href="#364">364</a>         Document encryptedDoc = builder.build(doc, crypto, secHeader);
+<a name="365" href="#365">365</a>         
+<a name="366" href="#366">366</a>         byte[] encodedBytes = WSSecurityUtil.generateDigest(keyData);
+<a name="367" href="#367">367</a>         String identifier = Base64.encode(encodedBytes);
+<a name="368" href="#368">368</a>         secretKeyCallbackHandler.addSecretKey(identifier, keyData);
+<a name="369" href="#369">369</a>      
+<a name="370" href="#370">370</a>         String outputString = 
+<a name="371" href="#371">371</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
+<a name="372" href="#372">372</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="373" href="#373">373</a>             LOG.debug(<span class="jxr_string">"Encrypted message with ENCRYPTED_KEY_SHA1_IDENTIFIER:"</span>);
+<a name="374" href="#374">374</a>             LOG.debug(outputString);
+<a name="375" href="#375">375</a>         }
+<a name="376" href="#376">376</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"#EncryptedKeySHA1"</span>) != -1);
+<a name="377" href="#377">377</a>      
+<a name="378" href="#378">378</a>         LOG.info(<span class="jxr_string">"After Encrypting EncryptedKeySHA1...."</span>);
+<a name="379" href="#379">379</a>         verify(encryptedDoc, crypto, secretKeyCallbackHandler);
+<a name="380" href="#380">380</a>     }
 <a name="381" href="#381">381</a>     
-<a name="382" href="#382">382</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="383" href="#383">383</a> <em class="jxr_javadoccomment">     * Test that encrypts using EncryptedKeySHA1, where it uses a symmetric key, rather than a </em>
-<a name="384" href="#384">384</a> <em class="jxr_javadoccomment">     * generated session key which is then encrypted using a public key. The request is generated</em>
-<a name="385" href="#385">385</a> <em class="jxr_javadoccomment">     * using WSHandler, instead of coding it.</em>
-<a name="386" href="#386">386</a> <em class="jxr_javadoccomment">     * </em>
-<a name="387" href="#387">387</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is any problem in encryption or decryption</em>
-<a name="388" href="#388">388</a> <em class="jxr_javadoccomment">     */</em>
-<a name="389" href="#389">389</a>     @org.junit.Test
-<a name="390" href="#390">390</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionSHA1SymmetricBytesHandler() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="391" href="#391">391</a>         <strong class="jxr_keyword">final</strong> WSSConfig cfg = WSSConfig.getNewInstance();
-<a name="392" href="#392">392</a>         <strong class="jxr_keyword">final</strong> RequestData reqData = <strong class="jxr_keyword">new</strong> RequestData();
-<a name="393" href="#393">393</a>         reqData.setWssConfig(cfg);
-<a name="394" href="#394">394</a>         java.util.Map&lt;String, Object&gt; messageContext = <strong class="jxr_keyword">new</strong> java.util.TreeMap&lt;String, Object&gt;();
-<a name="395" href="#395">395</a>         messageContext.put(WSHandlerConstants.ENC_SYM_ENC_KEY, <span class="jxr_string">"false"</span>);
-<a name="396" href="#396">396</a>         messageContext.put(WSHandlerConstants.ENC_KEY_ID, <span class="jxr_string">"EncryptedKeySHA1"</span>);
-<a name="397" href="#397">397</a>         secretKeyCallbackHandler.setOutboundSecret(keyData);
-<a name="398" href="#398">398</a>         messageContext.put(WSHandlerConstants.PW_CALLBACK_REF, secretKeyCallbackHandler);
-<a name="399" href="#399">399</a>         reqData.setMsgContext(messageContext);
-<a name="400" href="#400">400</a>         reqData.setUsername(<span class="jxr_string">""</span>);
-<a name="401" href="#401">401</a>         
-<a name="402" href="#402">402</a>         <strong class="jxr_keyword">final</strong> java.util.List&lt;Integer&gt; actions = <strong class="jxr_keyword">new</strong> java.util.ArrayList&lt;Integer&gt;();
-<a name="403" href="#403">403</a>         actions.add(<strong class="jxr_keyword">new</strong> Integer(WSConstants.ENCR));
-<a name="404" href="#404">404</a>         <strong class="jxr_keyword">final</strong> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="405" href="#405">405</a>         <a href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a> handler = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a>();
-<a name="406" href="#406">406</a>         handler.send(
-<a name="407" href="#407">407</a>             WSConstants.ENCR, 
-<a name="408" href="#408">408</a>             doc, 
-<a name="409" href="#409">409</a>             reqData, 
-<a name="410" href="#410">410</a>             actions,
-<a name="411" href="#411">411</a>             <strong class="jxr_keyword">true</strong>
-<a name="412" href="#412">412</a>         );
-<a name="413" href="#413">413</a>         
-<a name="414" href="#414">414</a>         String outputString = 
-<a name="415" href="#415">415</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
-<a name="416" href="#416">416</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="417" href="#417">417</a>             LOG.debug(outputString);
-<a name="418" href="#418">418</a>         }
-<a name="419" href="#419">419</a>         
-<a name="420" href="#420">420</a>         verify(doc, (Crypto)<strong class="jxr_keyword">null</strong>, secretKeyCallbackHandler);
-<a name="421" href="#421">421</a>     }
-<a name="422" href="#422">422</a>     
-<a name="423" href="#423">423</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="424" href="#424">424</a> <em class="jxr_javadoccomment">     * Test that encrypt and decrypt a WS-Security envelope.</em>
-<a name="425" href="#425">425</a> <em class="jxr_javadoccomment">     * </em>
-<a name="426" href="#426">426</a> <em class="jxr_javadoccomment">     * This test uses the RSA_15 algorithm to transport (wrap) the symmetric key.</em>
-<a name="427" href="#427">427</a> <em class="jxr_javadoccomment">     * The test case creates a ReferenceList element that references EncryptedData</em>
-<a name="428" href="#428">428</a> <em class="jxr_javadoccomment">     * elements. The ReferencesList element is put into the Security header, not</em>
-<a name="429" href="#429">429</a> <em class="jxr_javadoccomment">     * as child of the EncryptedKey. The EncryptedData elements contain a KeyInfo</em>
-<a name="430" href="#430">430</a> <em class="jxr_javadoccomment">     * that references the EncryptedKey via a STR/Reference structure.</em>
-<a name="431" href="#431">431</a> <em class="jxr_javadoccomment">     * </em>
-<a name="432" href="#432">432</a> <em class="jxr_javadoccomment">     * Refer to OASIS WS Security spec 1.1, chap 7.7</em>
-<a name="433" href="#433">433</a> <em class="jxr_javadoccomment">     */</em>
-<a name="434" href="#434">434</a>     @org.junit.Test
-<a name="435" href="#435">435</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionDecryptionRSA15STR() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="436" href="#436">436</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
-<a name="437" href="#437">437</a>         builder.setUserInfo(<span class="jxr_string">"wss40"</span>);
-<a name="438" href="#438">438</a>         builder.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
-<a name="439" href="#439">439</a>         builder.setSymmetricEncAlgorithm(WSConstants.TRIPLE_DES);
-<a name="440" href="#440">440</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="441" href="#441">441</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
-<a name="442" href="#442">442</a>         secHeader.insertSecurityHeader(doc);
-<a name="443" href="#443">443</a>         LOG.info(<span class="jxr_string">"Before Encryption Triple DES...."</span>);
-<a name="444" href="#444">444</a> 
-<a name="445" href="#445">445</a>         <em class="jxr_comment">/*</em>
-<a name="446" href="#446">446</a> <em class="jxr_comment">         * Prepare the Encrypt object with the token, setup data structure</em>
-<a name="447" href="#447">447</a> <em class="jxr_comment">         */</em>
-<a name="448" href="#448">448</a>         builder.prepare(doc, crypto);
-<a name="449" href="#449">449</a> 
-<a name="450" href="#450">450</a>         <em class="jxr_comment">/*</em>
-<a name="451" href="#451">451</a> <em class="jxr_comment">         * Set up the parts structure to encrypt the body</em>
-<a name="452" href="#452">452</a> <em class="jxr_comment">         */</em>
-<a name="453" href="#453">453</a>         SOAPConstants soapConstants = WSSecurityUtil.getSOAPConstants(doc
-<a name="454" href="#454">454</a>                 .getDocumentElement());
-<a name="455" href="#455">455</a>         java.util.List&lt;WSEncryptionPart&gt; parts = <strong class="jxr_keyword">new</strong> ArrayList&lt;WSEncryptionPart&gt;();
-<a name="456" href="#456">456</a>         WSEncryptionPart encP = <strong class="jxr_keyword">new</strong> WSEncryptionPart(soapConstants
-<a name="457" href="#457">457</a>                 .getBodyQName().getLocalPart(), soapConstants.getEnvelopeURI(),
-<a name="458" href="#458">458</a>                 <span class="jxr_string">"Content"</span>);
-<a name="459" href="#459">459</a>         parts.add(encP);
-<a name="460" href="#460">460</a> 
-<a name="461" href="#461">461</a>         <em class="jxr_comment">/*</em>
-<a name="462" href="#462">462</a> <em class="jxr_comment">         * Encrypt the parts (Body), create EncryptedData elements that reference</em>
-<a name="463" href="#463">463</a> <em class="jxr_comment">         * the EncryptedKey, and get a ReferenceList that can be put into the</em>
-<a name="464" href="#464">464</a> <em class="jxr_comment">         * Security header. Be sure that the ReferenceList is after the</em>
-<a name="465" href="#465">465</a> <em class="jxr_comment">         * EncryptedKey element in the Security header (strict layout)</em>
-<a name="466" href="#466">466</a> <em class="jxr_comment">         */</em>
-<a name="467" href="#467">467</a>         Element refs = builder.encryptForRef(<strong class="jxr_keyword">null</strong>, parts);
-<a name="468" href="#468">468</a>         builder.addExternalRefElement(refs, secHeader);
-<a name="469" href="#469">469</a> 
-<a name="470" href="#470">470</a>         <em class="jxr_comment">/*</em>
-<a name="471" href="#471">471</a> <em class="jxr_comment">         * now add (prepend) the EncryptedKey element, then a</em>
-<a name="472" href="#472">472</a> <em class="jxr_comment">         * BinarySecurityToken if one was setup during prepare</em>
-<a name="473" href="#473">473</a> <em class="jxr_comment">         */</em>
-<a name="474" href="#474">474</a>         builder.prependToHeader(secHeader);
-<a name="475" href="#475">475</a> 
-<a name="476" href="#476">476</a>         builder.prependBSTElementToHeader(secHeader);
-<a name="477" href="#477">477</a> 
-<a name="478" href="#478">478</a>         Document encryptedDoc = doc;
-<a name="479" href="#479">479</a>         LOG.info(<span class="jxr_string">"After Encryption Triple DES...."</span>);
-<a name="480" href="#480">480</a> 
-<a name="481" href="#481">481</a>         String outputString = 
-<a name="482" href="#482">482</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
-<a name="483" href="#483">483</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="484" href="#484">484</a>             LOG.debug(<span class="jxr_string">"Encrypted message, RSA-15 keytransport, 3DES:"</span>);
-<a name="485" href="#485">485</a>             LOG.debug(outputString);
-<a name="486" href="#486">486</a>         }
-<a name="487" href="#487">487</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"counter_port_type"</span>) == -1 ? <strong class="jxr_keyword">true</strong>
-<a name="488" href="#488">488</a>                 : false);
-<a name="489" href="#489">489</a>         verify(encryptedDoc, crypto, keystoreCallbackHandler);
-<a name="490" href="#490">490</a>         
-<a name="491" href="#491">491</a>         outputString = 
-<a name="492" href="#492">492</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
-<a name="493" href="#493">493</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"counter_port_type"</span>) &gt; 0 ? <strong class="jxr_keyword">true</strong>
-<a name="494" href="#494">494</a>                 : false);
-<a name="495" href="#495">495</a>     }
-<a name="496" href="#496">496</a>     
+<a name="382" href="#382">382</a>     
+<a name="383" href="#383">383</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="384" href="#384">384</a> <em class="jxr_javadoccomment">     * Test that encrypts using EncryptedKeySHA1, where it uses a symmetric key, rather than a </em>
+<a name="385" href="#385">385</a> <em class="jxr_javadoccomment">     * generated session key which is then encrypted using a public key. The request is generated</em>
+<a name="386" href="#386">386</a> <em class="jxr_javadoccomment">     * using WSHandler, instead of coding it.</em>
+<a name="387" href="#387">387</a> <em class="jxr_javadoccomment">     * </em>
+<a name="388" href="#388">388</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is any problem in encryption or decryption</em>
+<a name="389" href="#389">389</a> <em class="jxr_javadoccomment">     */</em>
+<a name="390" href="#390">390</a>     @org.junit.Test
+<a name="391" href="#391">391</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionSHA1SymmetricBytesHandler() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="392" href="#392">392</a>         <strong class="jxr_keyword">final</strong> WSSConfig cfg = WSSConfig.getNewInstance();
+<a name="393" href="#393">393</a>         <strong class="jxr_keyword">final</strong> RequestData reqData = <strong class="jxr_keyword">new</strong> RequestData();
+<a name="394" href="#394">394</a>         reqData.setWssConfig(cfg);
+<a name="395" href="#395">395</a>         java.util.Map&lt;String, Object&gt; messageContext = <strong class="jxr_keyword">new</strong> java.util.TreeMap&lt;String, Object&gt;();
+<a name="396" href="#396">396</a>         messageContext.put(WSHandlerConstants.ENC_SYM_ENC_KEY, <span class="jxr_string">"false"</span>);
+<a name="397" href="#397">397</a>         messageContext.put(WSHandlerConstants.ENC_KEY_ID, <span class="jxr_string">"EncryptedKeySHA1"</span>);
+<a name="398" href="#398">398</a>         secretKeyCallbackHandler.setOutboundSecret(keyData);
+<a name="399" href="#399">399</a>         messageContext.put(WSHandlerConstants.PW_CALLBACK_REF, secretKeyCallbackHandler);
+<a name="400" href="#400">400</a>         reqData.setMsgContext(messageContext);
+<a name="401" href="#401">401</a>         reqData.setUsername(<span class="jxr_string">""</span>);
+<a name="402" href="#402">402</a>         
+<a name="403" href="#403">403</a>         <strong class="jxr_keyword">final</strong> java.util.List&lt;Integer&gt; actions = <strong class="jxr_keyword">new</strong> java.util.ArrayList&lt;Integer&gt;();
+<a name="404" href="#404">404</a>         actions.add(<strong class="jxr_keyword">new</strong> Integer(WSConstants.ENCR));
+<a name="405" href="#405">405</a>         <strong class="jxr_keyword">final</strong> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="406" href="#406">406</a>         <a href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a> handler = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a>();
+<a name="407" href="#407">407</a>         handler.send(
+<a name="408" href="#408">408</a>             WSConstants.ENCR, 
+<a name="409" href="#409">409</a>             doc, 
+<a name="410" href="#410">410</a>             reqData, 
+<a name="411" href="#411">411</a>             actions,
+<a name="412" href="#412">412</a>             <strong class="jxr_keyword">true</strong>
+<a name="413" href="#413">413</a>         );
+<a name="414" href="#414">414</a>         
+<a name="415" href="#415">415</a>         String outputString = 
+<a name="416" href="#416">416</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
+<a name="417" href="#417">417</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="418" href="#418">418</a>             LOG.debug(outputString);
+<a name="419" href="#419">419</a>         }
+<a name="420" href="#420">420</a>         
+<a name="421" href="#421">421</a>         verify(doc, (Crypto)<strong class="jxr_keyword">null</strong>, secretKeyCallbackHandler);
+<a name="422" href="#422">422</a>     }
+<a name="423" href="#423">423</a>     
+<a name="424" href="#424">424</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="425" href="#425">425</a> <em class="jxr_javadoccomment">     * Test that encrypt and decrypt a WS-Security envelope.</em>
+<a name="426" href="#426">426</a> <em class="jxr_javadoccomment">     * </em>
+<a name="427" href="#427">427</a> <em class="jxr_javadoccomment">     * This test uses the RSA_15 algorithm to transport (wrap) the symmetric key.</em>
+<a name="428" href="#428">428</a> <em class="jxr_javadoccomment">     * The test case creates a ReferenceList element that references EncryptedData</em>
+<a name="429" href="#429">429</a> <em class="jxr_javadoccomment">     * elements. The ReferencesList element is put into the Security header, not</em>
+<a name="430" href="#430">430</a> <em class="jxr_javadoccomment">     * as child of the EncryptedKey. The EncryptedData elements contain a KeyInfo</em>
+<a name="431" href="#431">431</a> <em class="jxr_javadoccomment">     * that references the EncryptedKey via a STR/Reference structure.</em>
+<a name="432" href="#432">432</a> <em class="jxr_javadoccomment">     * </em>
+<a name="433" href="#433">433</a> <em class="jxr_javadoccomment">     * Refer to OASIS WS Security spec 1.1, chap 7.7</em>
+<a name="434" href="#434">434</a> <em class="jxr_javadoccomment">     */</em>
+<a name="435" href="#435">435</a>     @org.junit.Test
+<a name="436" href="#436">436</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptionDecryptionRSA15STR() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="437" href="#437">437</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
+<a name="438" href="#438">438</a>         builder.setUserInfo(<span class="jxr_string">"wss40"</span>);
+<a name="439" href="#439">439</a>         builder.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
+<a name="440" href="#440">440</a>         builder.setSymmetricEncAlgorithm(WSConstants.TRIPLE_DES);
+<a name="441" href="#441">441</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="442" href="#442">442</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="443" href="#443">443</a>         secHeader.insertSecurityHeader(doc);
+<a name="444" href="#444">444</a>         LOG.info(<span class="jxr_string">"Before Encryption Triple DES...."</span>);
+<a name="445" href="#445">445</a> 
+<a name="446" href="#446">446</a>         <em class="jxr_comment">/*</em>
+<a name="447" href="#447">447</a> <em class="jxr_comment">         * Prepare the Encrypt object with the token, setup data structure</em>
+<a name="448" href="#448">448</a> <em class="jxr_comment">         */</em>
+<a name="449" href="#449">449</a>         builder.prepare(doc, crypto);
+<a name="450" href="#450">450</a> 
+<a name="451" href="#451">451</a>         <em class="jxr_comment">/*</em>
+<a name="452" href="#452">452</a> <em class="jxr_comment">         * Set up the parts structure to encrypt the body</em>
+<a name="453" href="#453">453</a> <em class="jxr_comment">         */</em>
+<a name="454" href="#454">454</a>         SOAPConstants soapConstants = WSSecurityUtil.getSOAPConstants(doc
+<a name="455" href="#455">455</a>                 .getDocumentElement());
+<a name="456" href="#456">456</a>         java.util.List&lt;WSEncryptionPart&gt; parts = <strong class="jxr_keyword">new</strong> ArrayList&lt;WSEncryptionPart&gt;();
+<a name="457" href="#457">457</a>         WSEncryptionPart encP = <strong class="jxr_keyword">new</strong> WSEncryptionPart(soapConstants
+<a name="458" href="#458">458</a>                 .getBodyQName().getLocalPart(), soapConstants.getEnvelopeURI(),
+<a name="459" href="#459">459</a>                 <span class="jxr_string">"Content"</span>);
+<a name="460" href="#460">460</a>         parts.add(encP);
+<a name="461" href="#461">461</a> 
+<a name="462" href="#462">462</a>         <em class="jxr_comment">/*</em>
+<a name="463" href="#463">463</a> <em class="jxr_comment">         * Encrypt the parts (Body), create EncryptedData elements that reference</em>
+<a name="464" href="#464">464</a> <em class="jxr_comment">         * the EncryptedKey, and get a ReferenceList that can be put into the</em>
+<a name="465" href="#465">465</a> <em class="jxr_comment">         * Security header. Be sure that the ReferenceList is after the</em>
+<a name="466" href="#466">466</a> <em class="jxr_comment">         * EncryptedKey element in the Security header (strict layout)</em>
+<a name="467" href="#467">467</a> <em class="jxr_comment">         */</em>
+<a name="468" href="#468">468</a>         Element refs = builder.encryptForRef(<strong class="jxr_keyword">null</strong>, parts);
+<a name="469" href="#469">469</a>         builder.addExternalRefElement(refs, secHeader);
+<a name="470" href="#470">470</a> 
+<a name="471" href="#471">471</a>         <em class="jxr_comment">/*</em>
+<a name="472" href="#472">472</a> <em class="jxr_comment">         * now add (prepend) the EncryptedKey element, then a</em>
+<a name="473" href="#473">473</a> <em class="jxr_comment">         * BinarySecurityToken if one was setup during prepare</em>
+<a name="474" href="#474">474</a> <em class="jxr_comment">         */</em>
+<a name="475" href="#475">475</a>         builder.prependToHeader(secHeader);
+<a name="476" href="#476">476</a> 
+<a name="477" href="#477">477</a>         builder.prependBSTElementToHeader(secHeader);
+<a name="478" href="#478">478</a> 
+<a name="479" href="#479">479</a>         Document encryptedDoc = doc;
+<a name="480" href="#480">480</a>         LOG.info(<span class="jxr_string">"After Encryption Triple DES...."</span>);
+<a name="481" href="#481">481</a> 
+<a name="482" href="#482">482</a>         String outputString = 
+<a name="483" href="#483">483</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
+<a name="484" href="#484">484</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="485" href="#485">485</a>             LOG.debug(<span class="jxr_string">"Encrypted message, RSA-15 keytransport, 3DES:"</span>);
+<a name="486" href="#486">486</a>             LOG.debug(outputString);
+<a name="487" href="#487">487</a>         }
+<a name="488" href="#488">488</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"counter_port_type"</span>) == -1 ? <strong class="jxr_keyword">true</strong>
+<a name="489" href="#489">489</a>                 : false);
+<a name="490" href="#490">490</a>         verify(encryptedDoc, crypto, keystoreCallbackHandler);
+<a name="491" href="#491">491</a>         
+<a name="492" href="#492">492</a>         outputString = 
+<a name="493" href="#493">493</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
+<a name="494" href="#494">494</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"counter_port_type"</span>) &gt; 0 ? <strong class="jxr_keyword">true</strong>
+<a name="495" href="#495">495</a>                 : false);
+<a name="496" href="#496">496</a>     }
 <a name="497" href="#497">497</a>     
-<a name="498" href="#498">498</a>     @org.junit.Test
-<a name="499" href="#499">499</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testBadAttribute() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="500" href="#500">500</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
-<a name="501" href="#501">501</a>         builder.setUserInfo(<span class="jxr_string">"wss40"</span>);
-<a name="502" href="#502">502</a>         builder.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
-<a name="503" href="#503">503</a>         builder.setSymmetricEncAlgorithm(WSConstants.TRIPLE_DES);
-<a name="504" href="#504">504</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="505" href="#505">505</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
-<a name="506" href="#506">506</a>         secHeader.insertSecurityHeader(doc);
-<a name="507" href="#507">507</a> 
-<a name="508" href="#508">508</a>         <em class="jxr_comment">/*</em>
-<a name="509" href="#509">509</a> <em class="jxr_comment">         * Prepare the Encrypt object with the token, setup data structure</em>
-<a name="510" href="#510">510</a> <em class="jxr_comment">         */</em>
-<a name="511" href="#511">511</a>         builder.prepare(doc, crypto);
-<a name="512" href="#512">512</a> 
-<a name="513" href="#513">513</a>         <em class="jxr_comment">/*</em>
-<a name="514" href="#514">514</a> <em class="jxr_comment">         * Set up the parts structure to encrypt the body</em>
-<a name="515" href="#515">515</a> <em class="jxr_comment">         */</em>
-<a name="516" href="#516">516</a>         SOAPConstants soapConstants = WSSecurityUtil.getSOAPConstants(doc
-<a name="517" href="#517">517</a>                 .getDocumentElement());
-<a name="518" href="#518">518</a>         java.util.List&lt;WSEncryptionPart&gt; parts = <strong class="jxr_keyword">new</strong> ArrayList&lt;WSEncryptionPart&gt;();
-<a name="519" href="#519">519</a>         WSEncryptionPart encP = <strong class="jxr_keyword">new</strong> WSEncryptionPart(soapConstants
-<a name="520" href="#520">520</a>                 .getBodyQName().getLocalPart(), soapConstants.getEnvelopeURI(),
-<a name="521" href="#521">521</a>                 <span class="jxr_string">"Content"</span>);
-<a name="522" href="#522">522</a>         parts.add(encP);
-<a name="523" href="#523">523</a> 
-<a name="524" href="#524">524</a>         <em class="jxr_comment">/*</em>
-<a name="525" href="#525">525</a> <em class="jxr_comment">         * Encrypt the parts (Body), create EncryptedData elements that reference</em>
-<a name="526" href="#526">526</a> <em class="jxr_comment">         * the EncryptedKey, and get a ReferenceList that can be put into the</em>
-<a name="527" href="#527">527</a> <em class="jxr_comment">         * Security header. Be sure that the ReferenceList is after the</em>
-<a name="528" href="#528">528</a> <em class="jxr_comment">         * EncryptedKey element in the Security header (strict layout)</em>
-<a name="529" href="#529">529</a> <em class="jxr_comment">         */</em>
-<a name="530" href="#530">530</a>         Element refs = builder.encryptForRef(<strong class="jxr_keyword">null</strong>, parts);
-<a name="531" href="#531">531</a>         builder.addExternalRefElement(refs, secHeader);
-<a name="532" href="#532">532</a> 
-<a name="533" href="#533">533</a>         <em class="jxr_comment">/*</em>
-<a name="534" href="#534">534</a> <em class="jxr_comment">         * now add (prepend) the EncryptedKey element, then a</em>
-<a name="535" href="#535">535</a> <em class="jxr_comment">         * BinarySecurityToken if one was setup during prepare</em>
-<a name="536" href="#536">536</a> <em class="jxr_comment">         */</em>
-<a name="537" href="#537">537</a>         Element encryptedKeyElement = builder.getEncryptedKeyElement();
-<a name="538" href="#538">538</a>         encryptedKeyElement.setAttributeNS(<strong class="jxr_keyword">null</strong>, <span class="jxr_string">"Type"</span>, <span class="jxr_string">"SomeType"</span>);
-<a name="539" href="#539">539</a>         WSSecurityUtil.prependChildElement(secHeader.getSecurityHeader(), encryptedKeyElement);
-<a name="540" href="#540">540</a> 
-<a name="541" href="#541">541</a>         builder.prependBSTElementToHeader(secHeader);
-<a name="542" href="#542">542</a> 
-<a name="543" href="#543">543</a>         Document encryptedDoc = doc;
-<a name="544" href="#544">544</a> 
-<a name="545" href="#545">545</a>         String outputString = 
-<a name="546" href="#546">546</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedDoc);
-<a name="547" href="#547">547</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="548" href="#548">548</a>             LOG.debug(outputString);
-<a name="549" href="#549">549</a>         }
-<a name="550" href="#550">550</a>         
-<a name="551" href="#551">551</a>         <em class="jxr_comment">// Turn off BSP compliance</em>
-<a name="552" href="#552">552</a>         WSSecurityEngine newEngine = <strong class="jxr_keyword">new</strong> WSSecurityEngine();
-<a name="553" href="#553">553</a>         WSSConfig wssConfig = WSSConfig.getNewInstance();
-<a name="554" href="#554">554</a>         wssConfig.setWsiBSPCompliant(false);
-<a name="555" href="#555">555</a>         newEngine.setWssConfig(wssConfig);
-<a name="556" href="#556">556</a>         newEngine.processSecurityHeader(encryptedDoc, <strong class="jxr_keyword">null</strong>, keystoreCallbackHandler, crypto);
-<a name="557" href="#557">557</a>         
-<a name="558" href="#558">558</a>         <em class="jxr_comment">// Now turn on BSP compliance</em>
-<a name="559" href="#559">559</a>         wssConfig.setWsiBSPCompliant(<strong class="jxr_keyword">true</strong>);
-<a name="560" href="#560">560</a>         newEngine.setWssConfig(wssConfig);
-<a name="561" href="#561">561</a>         <strong class="jxr_keyword">try</strong> {
-<a name="562" href="#562">562</a>             newEngine.processSecurityHeader(encryptedDoc, <strong class="jxr_keyword">null</strong>, keystoreCallbackHandler, crypto);
-<a name="563" href="#563">563</a>             fail(<span class="jxr_string">"Failure expected on a bad attribute type"</span>);
-<a name="564" href="#564">564</a>         } <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) {
-<a name="565" href="#565">565</a>             assertTrue(ex.getMessage().contains(<span class="jxr_string">"bad attribute"</span>));
-<a name="566" href="#566">566</a>         }
-<a name="567" href="#567">567</a>     }
-<a name="568" href="#568">568</a>     
-<a name="569" href="#569">569</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="570" href="#570">570</a> <em class="jxr_javadoccomment">     * In this test an EncryptedKey structure is embedded in the EncryptedData structure.</em>
-<a name="571" href="#571">571</a> <em class="jxr_javadoccomment">     * The EncryptedKey structure refers to a certificate via the SKI_KEY_IDENTIFIER.</em>
-<a name="572" href="#572">572</a> <em class="jxr_javadoccomment">     */</em>
-<a name="573" href="#573">573</a>     @org.junit.Test
-<a name="574" href="#574">574</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEmbeddedEncryptedKey() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="575" href="#575">575</a>         Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="576" href="#576">576</a>         
-<a name="577" href="#577">577</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
-<a name="578" href="#578">578</a>         builder.setUserInfo(<span class="jxr_string">"wss40"</span>);
-<a name="579" href="#579">579</a>         builder.setKeyIdentifierType(WSConstants.SKI_KEY_IDENTIFIER);
-<a name="580" href="#580">580</a>         builder.setSymmetricEncAlgorithm(WSConstants.AES_128);
-<a name="581" href="#581">581</a>         builder.prepare(doc, crypto);
-<a name="582" href="#582">582</a>         builder.setEmbedEncryptedKey(<strong class="jxr_keyword">true</strong>);
-<a name="583" href="#583">583</a> 
-<a name="584" href="#584">584</a>         SOAPConstants soapConstants = WSSecurityUtil.getSOAPConstants(doc
-<a name="585" href="#585">585</a>                 .getDocumentElement());
-<a name="586" href="#586">586</a>         java.util.List&lt;WSEncryptionPart&gt; parts = <strong class="jxr_keyword">new</strong> ArrayList&lt;WSEncryptionPart&gt;();
-<a name="587" href="#587">587</a>         WSEncryptionPart encP = <strong class="jxr_keyword">new</strong> WSEncryptionPart(soapConstants
-<a name="588" href="#588">588</a>                 .getBodyQName().getLocalPart(), soapConstants.getEnvelopeURI(),
-<a name="589" href="#589">589</a>                 <span class="jxr_string">"Content"</span>);
-<a name="590" href="#590">590</a>         parts.add(encP);
-<a name="591" href="#591">591</a> 
-<a name="592" href="#592">592</a>         builder.encryptForRef(<strong class="jxr_keyword">null</strong>, parts);
-<a name="593" href="#593">593</a> 
-<a name="594" href="#594">594</a>         String outputString = 
-<a name="595" href="#595">595</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
-<a name="596" href="#596">596</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="597" href="#597">597</a>             LOG.debug(outputString);
-<a name="598" href="#598">598</a>         }
-<a name="599" href="#599">599</a>         
-<a name="600" href="#600">600</a>         verify(doc, crypto, keystoreCallbackHandler);
-<a name="601" href="#601">601</a>     }
-<a name="602" href="#602">602</a> 
-<a name="603" href="#603">603</a>     
-<a name="604" href="#604">604</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="605" href="#605">605</a> <em class="jxr_javadoccomment">     * Verifies the soap envelope &lt;p/&gt;</em>
-<a name="606" href="#606">606</a> <em class="jxr_javadoccomment">     * </em>
-<a name="607" href="#607">607</a> <em class="jxr_javadoccomment">     * @param envelope</em>
-<a name="608" href="#608">608</a> <em class="jxr_javadoccomment">     * @throws Exception</em>
-<a name="609" href="#609">609</a> <em class="jxr_javadoccomment">     *             Thrown when there is a problem in verification</em>
-<a name="610" href="#610">610</a> <em class="jxr_javadoccomment">     */</em>
-<a name="611" href="#611">611</a>     <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">void</strong> verify(
-<a name="612" href="#612">612</a>         Document doc, Crypto decCrypto, CallbackHandler handler
-<a name="613" href="#613">613</a>     ) <strong class="jxr_keyword">throws</strong> Exception {
-<a name="614" href="#614">614</a>         secEngine.processSecurityHeader(doc, <strong class="jxr_keyword">null</strong>, handler, decCrypto);
-<a name="615" href="#615">615</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="616" href="#616">616</a>             String outputString = 
-<a name="617" href="#617">617</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
-<a name="618" href="#618">618</a>             LOG.debug(outputString);
-<a name="619" href="#619">619</a>         }
-<a name="620" href="#620">620</a>     }
-<a name="621" href="#621">621</a>     
-<a name="622" href="#622">622</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="623" href="#623">623</a> <em class="jxr_javadoccomment">     * Verifies the soap envelope</em>
-<a name="624" href="#624">624</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a name="625" href="#625">625</a> <em class="jxr_javadoccomment">     * </em>
-<a name="626" href="#626">626</a> <em class="jxr_javadoccomment">     * @param envelope </em>
-<a name="627" href="#627">627</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is a problem in verification</em>
-<a name="628" href="#628">628</a> <em class="jxr_javadoccomment">     */</em>
-<a name="629" href="#629">629</a>     @SuppressWarnings(<span class="jxr_string">"unchecked"</span>)
-<a name="630" href="#630">630</a>     <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">void</strong> verify(
-<a name="631" href="#631">631</a>         Document doc,
-<a name="632" href="#632">632</a>         CallbackHandler handler,
-<a name="633" href="#633">633</a>         javax.xml.namespace.QName expectedEncryptedElement
-<a name="634" href="#634">634</a>     ) <strong class="jxr_keyword">throws</strong> Exception {
-<a name="635" href="#635">635</a>         <strong class="jxr_keyword">final</strong> java.util.List&lt;WSSecurityEngineResult&gt; results = 
-<a name="636" href="#636">636</a>             secEngine.processSecurityHeader(doc, <strong class="jxr_keyword">null</strong>, handler, <strong class="jxr_keyword">null</strong>, crypto);
-<a name="637" href="#637">637</a>         String outputString = 
-<a name="638" href="#638">638</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
-<a name="639" href="#639">639</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="640" href="#640">640</a>             LOG.debug(outputString);
-<a name="641" href="#641">641</a>         }
-<a name="642" href="#642">642</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"counter_port_type"</span>) &gt; 0 ? <strong class="jxr_keyword">true</strong> : false);
-<a name="643" href="#643">643</a>         <em class="jxr_comment">//</em>
-<a name="644" href="#644">644</a>         <em class="jxr_comment">// walk through the results, and make sure there is an encryption</em>
-<a name="645" href="#645">645</a>         <em class="jxr_comment">// action, together with a reference to the decrypted element </em>
-<a name="646" href="#646">646</a>         <em class="jxr_comment">// (as a QName)</em>
-<a name="647" href="#647">647</a>         <em class="jxr_comment">//</em>
-<a name="648" href="#648">648</a>         <strong class="jxr_keyword">boolean</strong> encrypted = false;
-<a name="649" href="#649">649</a>         <strong class="jxr_keyword">for</strong> (java.util.Iterator&lt;WSSecurityEngineResult&gt; ipos = results.iterator(); 
-<a name="650" href="#650">650</a>             ipos.hasNext();) {
-<a name="651" href="#651">651</a>             <strong class="jxr_keyword">final</strong> WSSecurityEngineResult result = ipos.next();
-<a name="652" href="#652">652</a>             <strong class="jxr_keyword">final</strong> Integer action = (Integer) result.get(WSSecurityEngineResult.TAG_ACTION);
-<a name="653" href="#653">653</a>             assertNotNull(action);
-<a name="654" href="#654">654</a>             <strong class="jxr_keyword">if</strong> ((action.intValue() &amp; WSConstants.ENCR) != 0) {
-<a name="655" href="#655">655</a>                 <strong class="jxr_keyword">final</strong> java.util.List&lt;WSDataRef&gt; refs =
-<a name="656" href="#656">656</a>                     (java.util.List&lt;WSDataRef&gt;) result.get(WSSecurityEngineResult.TAG_DATA_REF_URIS);
-<a name="657" href="#657">657</a>                 assertNotNull(refs);
-<a name="658" href="#658">658</a>                 encrypted = <strong class="jxr_keyword">true</strong>;
-<a name="659" href="#659">659</a>                 <strong class="jxr_keyword">for</strong> (java.util.Iterator&lt;WSDataRef&gt; jpos = refs.iterator(); jpos.hasNext();) {
-<a name="660" href="#660">660</a>                     <strong class="jxr_keyword">final</strong> WSDataRef ref = jpos.next();
-<a name="661" href="#661">661</a>                     assertNotNull(ref);
-<a name="662" href="#662">662</a>                     assertNotNull(ref.getName());
-<a name="663" href="#663">663</a>                     assertEquals(
-<a name="664" href="#664">664</a>                         expectedEncryptedElement,
-<a name="665" href="#665">665</a>                         ref.getName()
-<a name="666" href="#666">666</a>                     );
-<a name="667" href="#667">667</a>                     assertNotNull(ref.getProtectedElement());
-<a name="668" href="#668">668</a>                     <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="669" href="#669">669</a>                         LOG.debug(<span class="jxr_string">"WSDataRef element: "</span>);
-<a name="670" href="#670">670</a>                         LOG.debug(
-<a name="671" href="#671">671</a>                             org.apache.ws.security.util.DOM2Writer.nodeToString(

[... 201 lines stripped ...]