You are viewing a plain text version of this content. The canonical link for it is here.
Posted to fx-dev@ws.apache.org by ru...@apache.org on 2006/05/02 11:36:30 UTC

svn commit: r398880 [6/10] - in /webservices/wss4j/site/xref-test: ./ components/ interop/ policy/ sandbox/ secconv/ secconv/components/ secconv/scenarios/ secconv/scenarios/ping/ secconv/scenarios/ping/impl/ wssec/

Added: webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew13.html
URL: http://svn.apache.org/viewcvs/webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew13.html?rev=398880&view=auto
==============================================================================
--- webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew13.html (added)
+++ webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew13.html Tue May  2 02:36:22 2006
@@ -0,0 +1,203 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" /><title>TestWSSecurityNew13 xref</title>
+<link type="text/css" rel="stylesheet" href="../stylesheet.css" />
+</head>
+<body>
+<pre>
+
+<a name="1" href="#1">1</a>   <em class="comment">/*</em>
+<a name="2" href="#2">2</a>   <em class="comment"> * Copyright  2003-2004 The Apache Software Foundation.</em>
+<a name="3" href="#3">3</a>   <em class="comment"> *</em>
+<a name="4" href="#4">4</a>   <em class="comment"> *  Licensed under the Apache License, Version 2.0 (the "License");</em>
+<a name="5" href="#5">5</a>   <em class="comment"> *  you may not use this file except in compliance with the License.</em>
+<a name="6" href="#6">6</a>   <em class="comment"> *  You may obtain a copy of the License at</em>
+<a name="7" href="#7">7</a>   <em class="comment"> *</em>
+<a name="8" href="#8">8</a>   <em class="comment"> *      <a href="http://www.apache.org/licenses/LICENSE-2.0" target="alexandria_uri">http://www.apache.org/licenses/LICENSE-2.0</a></em>
+<a name="9" href="#9">9</a>   <em class="comment"> *</em>
+<a name="10" href="#10">10</a>  <em class="comment"> *  Unless required by applicable law or agreed to in writing, software</em>
+<a name="11" href="#11">11</a>  <em class="comment"> *  distributed under the License is distributed on an "AS IS" BASIS,</em>
+<a name="12" href="#12">12</a>  <em class="comment"> *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.</em>
+<a name="13" href="#13">13</a>  <em class="comment"> *  See the License for the specific language governing permissions and</em>
+<a name="14" href="#14">14</a>  <em class="comment"> *  limitations under the License.</em>
+<a name="15" href="#15">15</a>  <em class="comment"> *</em>
+<a name="16" href="#16">16</a>  <em class="comment"> */</em>
+<a name="17" href="#17">17</a>  
+<a name="18" href="#18">18</a>  <strong>package</strong> <a href="../wssec/package-summary.html">wssec</a>;
+<a name="19" href="#19">19</a>  
+<a name="20" href="#20">20</a>  <strong>import</strong> junit.framework.Test;
+<a name="21" href="#21">21</a>  <strong>import</strong> junit.framework.TestCase;
+<a name="22" href="#22">22</a>  <strong>import</strong> junit.framework.TestSuite;
+<a name="23" href="#23">23</a>  <strong>import</strong> org.apache.axis.Message;
+<a name="24" href="#24">24</a>  <strong>import</strong> org.apache.axis.MessageContext;
+<a name="25" href="#25">25</a>  <strong>import</strong> org.apache.axis.utils.XMLUtils;
+<a name="26" href="#26">26</a>  <strong>import</strong> org.apache.axis.client.AxisClient;
+<a name="27" href="#27">27</a>  <strong>import</strong> org.apache.axis.configuration.NullProvider;
+<a name="28" href="#28">28</a>  <strong>import</strong> org.apache.axis.message.SOAPEnvelope;
+<a name="29" href="#29">29</a>  <strong>import</strong> org.apache.commons.logging.Log;
+<a name="30" href="#30">30</a>  <strong>import</strong> org.apache.commons.logging.LogFactory;
+<a name="31" href="#31">31</a>  <strong>import</strong> org.apache.ws.security.WSPasswordCallback;
+<a name="32" href="#32">32</a>  <strong>import</strong> org.apache.ws.security.WSSecurityEngine;
+<a name="33" href="#33">33</a>  <strong>import</strong> org.apache.ws.security.WSConstants;
+<a name="34" href="#34">34</a>  <strong>import</strong> org.apache.ws.security.message.WSSecUsernameToken;
+<a name="35" href="#35">35</a>  <strong>import</strong> org.apache.ws.security.message.WSSecSignature;
+<a name="36" href="#36">36</a>  <strong>import</strong> org.apache.ws.security.message.WSSecHeader;
+<a name="37" href="#37">37</a>  
+<a name="38" href="#38">38</a>  <strong>import</strong> org.apache.xml.security.signature.XMLSignature;
+<a name="39" href="#39">39</a>  
+<a name="40" href="#40">40</a>  <strong>import</strong> org.w3c.dom.Document;
+<a name="41" href="#41">41</a>  
+<a name="42" href="#42">42</a>  <strong>import</strong> javax.security.auth.callback.Callback;
+<a name="43" href="#43">43</a>  <strong>import</strong> javax.security.auth.callback.CallbackHandler;
+<a name="44" href="#44">44</a>  <strong>import</strong> javax.security.auth.callback.UnsupportedCallbackException;
+<a name="45" href="#45">45</a>  <strong>import</strong> java.io.ByteArrayInputStream;
+<a name="46" href="#46">46</a>  <strong>import</strong> java.io.IOException;
+<a name="47" href="#47">47</a>  <strong>import</strong> java.io.InputStream;
+<a name="48" href="#48">48</a>  <strong>import</strong> java.io.PrintWriter;
+<a name="49" href="#49">49</a>  
+<a name="50" href="#50">50</a>  
+<a name="51" href="#51">51</a>  <em>/**<em>*</em></em>
+<a name="52" href="#52">52</a>  <em> * WS-Security Test Case</em>
+<a name="53" href="#53">53</a>  <em> * &lt;p/></em>
+<a name="54" href="#54">54</a>  <em> * </em>
+<a name="55" href="#55">55</a>  <em> * @author Werner Dittmann (Wern.erDittmann@siemens.com)</em>
+<a name="56" href="#56">56</a>  <em> */</em>
+<a name="57" href="#57">57</a>  <strong>public</strong> <strong>class</strong> TestWSSecurityNew13 <strong>extends</strong> TestCase implements CallbackHandler {
+<a name="58" href="#58">58</a>      <strong>private</strong> <strong>static</strong> Log log = LogFactory.getLog(TestWSSecurityNew13.<strong>class</strong>);
+<a name="59" href="#59">59</a>      <strong>static</strong> <strong>final</strong> String NS = <span class="string">"http://www.w3.org/2000/09/xmldsig#"</span>;
+<a name="60" href="#60">60</a>      <strong>static</strong> <strong>final</strong> String soapMsg = <span class="string">"&lt;?xml version=\&quot;1.0\&quot; encoding=\&quot;UTF-8\&quot;?>"</span> + <span class="string">"&lt;SOAP-ENV:Envelope xmlns:SOAP-ENV=\&quot;http://schemas.xmlsoap.org/soap/envelope/\&quot; xmlns:xsd=\&quot;http://www.w3.org/2001/XMLSchema\&quot; xmlns:xsi=\&quot;http://www.w3.org/2001/XMLSchema-instance\&quot;>"</span> + <span class="string">"&lt;SOAP-ENV:Body>"</span> + <span class="string">"&lt;add xmlns=\&quot;http://ws.apache.org/counter/counter_port_type\&quot;>"</span> + <span class="string">"&lt;value xmlns=\&quot;\&quot;>15&lt;/value>"</span> + <span class="string">"&lt;/add>"</span> + <span class="string">"&lt;/SOAP-ENV:Body>\r\n       \r\n"</span> + <span class="string">"&lt;/SOAP-ENV:Envelope>"</span>;
+<a name="61" href="#61">61</a>      <strong>static</strong> <strong>final</strong> WSSecurityEngine secEngine = <strong>new</strong> WSSecurityEngine();
+<a name="62" href="#62">62</a>      MessageContext msgContext;
+<a name="63" href="#63">63</a>      SOAPEnvelope unsignedEnvelope;
+<a name="64" href="#64">64</a>  
+<a name="65" href="#65">65</a>      <em>/**<em>*</em></em>
+<a name="66" href="#66">66</a>  <em>     * TestWSSecurity constructor</em>
+<a name="67" href="#67">67</a>  <em>     * &lt;p/></em>
+<a name="68" href="#68">68</a>  <em>     * </em>
+<a name="69" href="#69">69</a>  <em>     * @param name name of the test</em>
+<a name="70" href="#70">70</a>  <em>     */</em>
+<a name="71" href="#71">71</a>      <strong>public</strong> TestWSSecurityNew13(String name) {
+<a name="72" href="#72">72</a>          <strong>super</strong>(name);
+<a name="73" href="#73">73</a>      }
+<a name="74" href="#74">74</a>  
+<a name="75" href="#75">75</a>      <em>/**<em>*</em></em>
+<a name="76" href="#76">76</a>  <em>     * JUnit suite</em>
+<a name="77" href="#77">77</a>  <em>     * &lt;p/></em>
+<a name="78" href="#78">78</a>  <em>     * </em>
+<a name="79" href="#79">79</a>  <em>     * @return a junit test suite</em>
+<a name="80" href="#80">80</a>  <em>     */</em>
+<a name="81" href="#81">81</a>      <strong>public</strong> <strong>static</strong> Test suite() {
+<a name="82" href="#82">82</a>          <strong>return</strong> <strong>new</strong> TestSuite(TestWSSecurityNew13.<strong>class</strong>);
+<a name="83" href="#83">83</a>      }
+<a name="84" href="#84">84</a>  
+<a name="85" href="#85">85</a>      <em>/**<em>*</em></em>
+<a name="86" href="#86">86</a>  <em>     * Main method</em>
+<a name="87" href="#87">87</a>  <em>     * &lt;p/></em>
+<a name="88" href="#88">88</a>  <em>     * </em>
+<a name="89" href="#89">89</a>  <em>     * @param args command line args</em>
+<a name="90" href="#90">90</a>  <em>     */</em>
+<a name="91" href="#91">91</a>      <strong>public</strong> <strong>static</strong> <strong>void</strong> main(String[] args) {
+<a name="92" href="#92">92</a>          junit.textui.TestRunner.run(suite());
+<a name="93" href="#93">93</a>      }
+<a name="94" href="#94">94</a>  
+<a name="95" href="#95">95</a>      <em>/**<em>*</em></em>
+<a name="96" href="#96">96</a>  <em>     * Setup method</em>
+<a name="97" href="#97">97</a>  <em>     * &lt;p/></em>
+<a name="98" href="#98">98</a>  <em>     * </em>
+<a name="99" href="#99">99</a>  <em>     * @throws java.lang.Exception Thrown when there is a problem in setup</em>
+<a name="100" href="#100">100</a> <em>     */</em>
+<a name="101" href="#101">101</a>     <strong>protected</strong> <strong>void</strong> setUp() throws Exception {
+<a name="102" href="#102">102</a>         AxisClient tmpEngine = <strong>new</strong> AxisClient(<strong>new</strong> NullProvider());
+<a name="103" href="#103">103</a>         msgContext = <strong>new</strong> MessageContext(tmpEngine);
+<a name="104" href="#104">104</a>         unsignedEnvelope = getSOAPEnvelope();
+<a name="105" href="#105">105</a>     }
+<a name="106" href="#106">106</a> 
+<a name="107" href="#107">107</a>     <em>/**<em>*</em></em>
+<a name="108" href="#108">108</a> <em>     * Constructs a soap envelope</em>
+<a name="109" href="#109">109</a> <em>     * &lt;p/></em>
+<a name="110" href="#110">110</a> <em>     * </em>
+<a name="111" href="#111">111</a> <em>     * @return soap envelope</em>
+<a name="112" href="#112">112</a> <em>     * @throws java.lang.Exception if there is any problem constructing the soap envelope</em>
+<a name="113" href="#113">113</a> <em>     */</em>
+<a name="114" href="#114">114</a>     <strong>protected</strong> SOAPEnvelope getSOAPEnvelope() throws Exception {
+<a name="115" href="#115">115</a>         InputStream in = <strong>new</strong> ByteArrayInputStream(soapMsg.getBytes());
+<a name="116" href="#116">116</a>         Message msg = <strong>new</strong> Message(in);
+<a name="117" href="#117">117</a>         msg.setMessageContext(msgContext);
+<a name="118" href="#118">118</a>         <strong>return</strong> msg.getSOAPEnvelope();
+<a name="119" href="#119">119</a>     }
+<a name="120" href="#120">120</a> 
+<a name="121" href="#121">121</a>  
+<a name="122" href="#122">122</a>     <em>/**<em>*</em></em>
+<a name="123" href="#123">123</a> <em>     * Test the specific signing mehtod that use UsernameToken values</em>
+<a name="124" href="#124">124</a> <em>     * &lt;p/></em>
+<a name="125" href="#125">125</a> <em>     * </em>
+<a name="126" href="#126">126</a> <em>     * @throws java.lang.Exception Thrown when there is any problem in signing or verification</em>
+<a name="127" href="#127">127</a> <em>     */</em>
+<a name="128" href="#128">128</a>     <strong>public</strong> <strong>void</strong> testUsernameTokenSigning() throws Exception {
+<a name="129" href="#129">129</a>         SOAPEnvelope envelope = <strong>null</strong>;
+<a name="130" href="#130">130</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="131" href="#131">131</a> 
+<a name="132" href="#132">132</a>         WSSecHeader secHeader = <strong>new</strong> WSSecHeader();
+<a name="133" href="#133">133</a>         secHeader.insertSecurityHeader(doc);
+<a name="134" href="#134">134</a> 
+<a name="135" href="#135">135</a>         WSSecUsernameToken builder = <strong>new</strong> WSSecUsernameToken();
+<a name="136" href="#136">136</a>         builder.setPasswordType(WSConstants.PASSWORD_TEXT);
+<a name="137" href="#137">137</a>         builder.setUserInfo(<span class="string">"wernerd"</span>, <span class="string">"verySecret"</span>);
+<a name="138" href="#138">138</a>         builder.addCreated();
+<a name="139" href="#139">139</a>         builder.addNonce();
+<a name="140" href="#140">140</a>         builder.prepare(doc);
+<a name="141" href="#141">141</a>         
+<a name="142" href="#142">142</a>         WSSecSignature sign = <strong>new</strong> WSSecSignature();
+<a name="143" href="#143">143</a>         sign.setUsernameToken(builder);
+<a name="144" href="#144">144</a>         sign.setKeyIdentifierType(WSConstants.UT_SIGNING);
+<a name="145" href="#145">145</a>         sign.setSignatureAlgorithm(XMLSignature.ALGO_ID_MAC_HMAC_SHA1);
+<a name="146" href="#146">146</a>         log.info(<span class="string">"Before signing...."</span>);
+<a name="147" href="#147">147</a>         sign.build(doc, <strong>null</strong>, secHeader);
+<a name="148" href="#148">148</a>         log.info(<span class="string">"Before adding UsernameToken PW Text...."</span>);
+<a name="149" href="#149">149</a>         builder.prependToHeader(secHeader);
+<a name="150" href="#150">150</a>         Document signedDoc = doc;
+<a name="151" href="#151">151</a>         Message signedMsg = (Message) SOAPUtil.toSOAPMessage(signedDoc);
+<a name="152" href="#152">152</a>         <strong>if</strong> (log.isDebugEnabled()) {
+<a name="153" href="#153">153</a>             log.debug(<span class="string">"Message with UserNameToken PW Text:"</span>);
+<a name="154" href="#154">154</a>             XMLUtils.PrettyElementToWriter(signedMsg.getSOAPEnvelope().getAsDOM(), <strong>new</strong> PrintWriter(System.out));
+<a name="155" href="#155">155</a>         }
+<a name="156" href="#156">156</a>         signedDoc = signedMsg.getSOAPEnvelope().getAsDocument();
+<a name="157" href="#157">157</a>         log.info(<span class="string">"After adding UsernameToken PW Text...."</span>);
+<a name="158" href="#158">158</a>         verify(signedDoc);
+<a name="159" href="#159">159</a>     }
+<a name="160" href="#160">160</a>     <em>/**<em>*</em></em>
+<a name="161" href="#161">161</a> <em>     * Verifies the soap envelope</em>
+<a name="162" href="#162">162</a> <em>     * &lt;p/></em>
+<a name="163" href="#163">163</a> <em>     * </em>
+<a name="164" href="#164">164</a> <em>     * @param env soap envelope</em>
+<a name="165" href="#165">165</a> <em>     * @throws java.lang.Exception Thrown when there is a problem in verification</em>
+<a name="166" href="#166">166</a> <em>     */</em>
+<a name="167" href="#167">167</a>     <strong>private</strong> <strong>void</strong> verify(Document doc) throws Exception {
+<a name="168" href="#168">168</a>         log.info(<span class="string">"Before verifying UsernameToken...."</span>);
+<a name="169" href="#169">169</a>         secEngine.processSecurityHeader(doc, <strong>null</strong>, <strong>this</strong>, <strong>null</strong>);
+<a name="170" href="#170">170</a>         log.info(<span class="string">"After verifying UsernameToken...."</span>);
+<a name="171" href="#171">171</a>     }
+<a name="172" href="#172">172</a> 
+<a name="173" href="#173">173</a>     <strong>public</strong> <strong>void</strong> handle(Callback[] callbacks)
+<a name="174" href="#174">174</a>             throws IOException, UnsupportedCallbackException {
+<a name="175" href="#175">175</a>         <strong>for</strong> (<strong>int</strong> i = 0; i &lt; callbacks.length; i++) {
+<a name="176" href="#176">176</a>             <strong>if</strong> (callbacks[i] instanceof WSPasswordCallback) {
+<a name="177" href="#177">177</a>                 WSPasswordCallback pc = (WSPasswordCallback) callbacks[i];
+<a name="178" href="#178">178</a>                 <em class="comment">/*</em>
+<a name="179" href="#179">179</a> <em class="comment">                 * here call a function/method to lookup the password for</em>
+<a name="180" href="#180">180</a> <em class="comment">                 * the given identifier (e.g. a user name or keystore alias)</em>
+<a name="181" href="#181">181</a> <em class="comment">                 * e.g.: pc.setPassword(passStore.getPassword(pc.getIdentfifier))</em>
+<a name="182" href="#182">182</a> <em class="comment">                 * for Testing we supply a fixed name here.</em>
+<a name="183" href="#183">183</a> <em class="comment">                 */</em>
+<a name="184" href="#184">184</a>                 pc.setPassword(<span class="string">"verySecret"</span>);
+<a name="185" href="#185">185</a>             } <strong>else</strong> {
+<a name="186" href="#186">186</a>                 <strong>throw</strong> <strong>new</strong> UnsupportedCallbackException(callbacks[i], <span class="string">"Unrecognized Callback"</span>);
+<a name="187" href="#187">187</a>             }
+<a name="188" href="#188">188</a>         }
+<a name="189" href="#189">189</a>     }
+<a name="190" href="#190">190</a> }
+</pre>
+<hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
+</html>
+

Added: webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew14.html
URL: http://svn.apache.org/viewcvs/webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew14.html?rev=398880&view=auto
==============================================================================
--- webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew14.html (added)
+++ webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew14.html Tue May  2 02:36:22 2006
@@ -0,0 +1,200 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" /><title>TestWSSecurityNew14 xref</title>
+<link type="text/css" rel="stylesheet" href="../stylesheet.css" />
+</head>
+<body>
+<pre>
+
+<a name="1" href="#1">1</a>   <em class="comment">/*</em>
+<a name="2" href="#2">2</a>   <em class="comment"> * Copyright  2003-2004 The Apache Software Foundation.</em>
+<a name="3" href="#3">3</a>   <em class="comment"> *</em>
+<a name="4" href="#4">4</a>   <em class="comment"> *  Licensed under the Apache License, Version 2.0 (the "License");</em>
+<a name="5" href="#5">5</a>   <em class="comment"> *  you may not use this file except in compliance with the License.</em>
+<a name="6" href="#6">6</a>   <em class="comment"> *  You may obtain a copy of the License at</em>
+<a name="7" href="#7">7</a>   <em class="comment"> *</em>
+<a name="8" href="#8">8</a>   <em class="comment"> *      <a href="http://www.apache.org/licenses/LICENSE-2.0" target="alexandria_uri">http://www.apache.org/licenses/LICENSE-2.0</a></em>
+<a name="9" href="#9">9</a>   <em class="comment"> *</em>
+<a name="10" href="#10">10</a>  <em class="comment"> *  Unless required by applicable law or agreed to in writing, software</em>
+<a name="11" href="#11">11</a>  <em class="comment"> *  distributed under the License is distributed on an "AS IS" BASIS,</em>
+<a name="12" href="#12">12</a>  <em class="comment"> *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.</em>
+<a name="13" href="#13">13</a>  <em class="comment"> *  See the License for the specific language governing permissions and</em>
+<a name="14" href="#14">14</a>  <em class="comment"> *  limitations under the License.</em>
+<a name="15" href="#15">15</a>  <em class="comment"> *</em>
+<a name="16" href="#16">16</a>  <em class="comment"> */</em>
+<a name="17" href="#17">17</a>  
+<a name="18" href="#18">18</a>  <strong>package</strong> <a href="../wssec/package-summary.html">wssec</a>;
+<a name="19" href="#19">19</a>  
+<a name="20" href="#20">20</a>  <strong>import</strong> junit.framework.Test;
+<a name="21" href="#21">21</a>  <strong>import</strong> junit.framework.TestCase;
+<a name="22" href="#22">22</a>  <strong>import</strong> junit.framework.TestSuite;
+<a name="23" href="#23">23</a>  <strong>import</strong> org.apache.axis.Message;
+<a name="24" href="#24">24</a>  <strong>import</strong> org.apache.axis.MessageContext;
+<a name="25" href="#25">25</a>  <strong>import</strong> org.apache.axis.client.AxisClient;
+<a name="26" href="#26">26</a>  <strong>import</strong> org.apache.axis.utils.XMLUtils;
+<a name="27" href="#27">27</a>  <strong>import</strong> org.apache.axis.configuration.NullProvider;
+<a name="28" href="#28">28</a>  <strong>import</strong> org.apache.axis.message.SOAPEnvelope;
+<a name="29" href="#29">29</a>  <strong>import</strong> org.apache.commons.logging.Log;
+<a name="30" href="#30">30</a>  <strong>import</strong> org.apache.commons.logging.LogFactory;
+<a name="31" href="#31">31</a>  <strong>import</strong> org.apache.ws.security.WSSecurityEngine;
+<a name="32" href="#32">32</a>  <strong>import</strong> org.apache.ws.security.WSConstants;
+<a name="33" href="#33">33</a>  <strong>import</strong> org.apache.ws.security.components.crypto.Crypto;
+<a name="34" href="#34">34</a>  <strong>import</strong> org.apache.ws.security.components.crypto.CryptoFactory;
+<a name="35" href="#35">35</a>  <strong>import</strong> org.apache.ws.security.message.WSSecSignature;
+<a name="36" href="#36">36</a>  <strong>import</strong> org.apache.ws.security.message.WSSecHeader;
+<a name="37" href="#37">37</a>  <strong>import</strong> org.w3c.dom.Document;
+<a name="38" href="#38">38</a>  
+<a name="39" href="#39">39</a>  <strong>import</strong> java.io.ByteArrayInputStream;
+<a name="40" href="#40">40</a>  <strong>import</strong> java.io.InputStream;
+<a name="41" href="#41">41</a>  <strong>import</strong> java.io.PrintWriter;
+<a name="42" href="#42">42</a>  
+<a name="43" href="#43">43</a>  
+<a name="44" href="#44">44</a>  <em>/**<em>*</em></em>
+<a name="45" href="#45">45</a>  <em> * WS-Security Test Case</em>
+<a name="46" href="#46">46</a>  <em> * &lt;p/></em>
+<a name="47" href="#47">47</a>  <em> * </em>
+<a name="48" href="#48">48</a>  <em> * @author Davanum Srinivas (dims@yahoo.com)</em>
+<a name="49" href="#49">49</a>  <em> */</em>
+<a name="50" href="#50">50</a>  <strong>public</strong> <strong>class</strong> TestWSSecurityNew14 <strong>extends</strong> TestCase {
+<a name="51" href="#51">51</a>      <strong>private</strong> <strong>static</strong> Log log = LogFactory.getLog(TestWSSecurityNew14.<strong>class</strong>);
+<a name="52" href="#52">52</a>      <strong>static</strong> <strong>final</strong> String NS = <span class="string">"http://www.w3.org/2000/09/xmldsig#"</span>;
+<a name="53" href="#53">53</a>      <strong>static</strong> <strong>final</strong> String soapMsg = <span class="string">"&lt;?xml version=\&quot;1.0\&quot; encoding=\&quot;UTF-8\&quot;?>"</span> + <span class="string">"&lt;SOAP-ENV:Envelope xmlns:SOAP-ENV=\&quot;http://schemas.xmlsoap.org/soap/envelope/\&quot; xmlns:xsd=\&quot;http://www.w3.org/2001/XMLSchema\&quot; xmlns:xsi=\&quot;http://www.w3.org/2001/XMLSchema-instance\&quot;>"</span> + <span class="string">"&lt;SOAP-ENV:Body>"</span> + <span class="string">"&lt;add xmlns=\&quot;http://ws.apache.org/counter/counter_port_type\&quot;>"</span> + <span class="string">"&lt;value xmlns=\&quot;\&quot;>15&lt;/value>"</span> + <span class="string">"&lt;/add>"</span> + <span class="string">"&lt;/SOAP-ENV:Body>\r\n       \r\n"</span> + <span class="string">"&lt;/SOAP-ENV:Envelope>"</span>;
+<a name="54" href="#54">54</a>      <strong>static</strong> <strong>final</strong> WSSecurityEngine secEngine = <strong>new</strong> WSSecurityEngine();
+<a name="55" href="#55">55</a>      <strong>static</strong> <strong>final</strong> Crypto crypto = CryptoFactory.getInstance();
+<a name="56" href="#56">56</a>  
+<a name="57" href="#57">57</a>      MessageContext msgContext;
+<a name="58" href="#58">58</a>      SOAPEnvelope unsignedEnvelope;
+<a name="59" href="#59">59</a>  
+<a name="60" href="#60">60</a>      <em>/**<em>*</em></em>
+<a name="61" href="#61">61</a>  <em>     * TestWSSecurity constructor</em>
+<a name="62" href="#62">62</a>  <em>     * &lt;p/></em>
+<a name="63" href="#63">63</a>  <em>     * </em>
+<a name="64" href="#64">64</a>  <em>     * @param name name of the test</em>
+<a name="65" href="#65">65</a>  <em>     */</em>
+<a name="66" href="#66">66</a>      <strong>public</strong> TestWSSecurityNew14(String name) {
+<a name="67" href="#67">67</a>          <strong>super</strong>(name);
+<a name="68" href="#68">68</a>      }
+<a name="69" href="#69">69</a>  
+<a name="70" href="#70">70</a>      <em>/**<em>*</em></em>
+<a name="71" href="#71">71</a>  <em>     * JUnit suite</em>
+<a name="72" href="#72">72</a>  <em>     * &lt;p/></em>
+<a name="73" href="#73">73</a>  <em>     * </em>
+<a name="74" href="#74">74</a>  <em>     * @return a junit test suite</em>
+<a name="75" href="#75">75</a>  <em>     */</em>
+<a name="76" href="#76">76</a>      <strong>public</strong> <strong>static</strong> Test suite() {
+<a name="77" href="#77">77</a>          <strong>return</strong> <strong>new</strong> TestSuite(TestWSSecurityNew14.<strong>class</strong>);
+<a name="78" href="#78">78</a>      }
+<a name="79" href="#79">79</a>  
+<a name="80" href="#80">80</a>      <em>/**<em>*</em></em>
+<a name="81" href="#81">81</a>  <em>     * Main method</em>
+<a name="82" href="#82">82</a>  <em>     * &lt;p/></em>
+<a name="83" href="#83">83</a>  <em>     * </em>
+<a name="84" href="#84">84</a>  <em>     * @param args command line args</em>
+<a name="85" href="#85">85</a>  <em>     */</em>
+<a name="86" href="#86">86</a>      <strong>public</strong> <strong>static</strong> <strong>void</strong> main(String[] args) {
+<a name="87" href="#87">87</a>          junit.textui.TestRunner.run(suite());
+<a name="88" href="#88">88</a>      }
+<a name="89" href="#89">89</a>  
+<a name="90" href="#90">90</a>      <em>/**<em>*</em></em>
+<a name="91" href="#91">91</a>  <em>     * Setup method</em>
+<a name="92" href="#92">92</a>  <em>     * &lt;p/></em>
+<a name="93" href="#93">93</a>  <em>     * </em>
+<a name="94" href="#94">94</a>  <em>     * @throws java.lang.Exception Thrown when there is a problem in setup</em>
+<a name="95" href="#95">95</a>  <em>     */</em>
+<a name="96" href="#96">96</a>      <strong>protected</strong> <strong>void</strong> setUp() throws Exception {
+<a name="97" href="#97">97</a>          AxisClient tmpEngine = <strong>new</strong> AxisClient(<strong>new</strong> NullProvider());
+<a name="98" href="#98">98</a>          msgContext = <strong>new</strong> MessageContext(tmpEngine);
+<a name="99" href="#99">99</a>          unsignedEnvelope = getSOAPEnvelope();
+<a name="100" href="#100">100</a>     }
+<a name="101" href="#101">101</a> 
+<a name="102" href="#102">102</a>     <em>/**<em>*</em></em>
+<a name="103" href="#103">103</a> <em>     * Constructs a soap envelope</em>
+<a name="104" href="#104">104</a> <em>     * &lt;p/></em>
+<a name="105" href="#105">105</a> <em>     * </em>
+<a name="106" href="#106">106</a> <em>     * @return soap envelope</em>
+<a name="107" href="#107">107</a> <em>     * @throws java.lang.Exception if there is any problem constructing the soap envelope</em>
+<a name="108" href="#108">108</a> <em>     */</em>
+<a name="109" href="#109">109</a>     <strong>protected</strong> SOAPEnvelope getSOAPEnvelope() throws Exception {
+<a name="110" href="#110">110</a>         InputStream in = <strong>new</strong> ByteArrayInputStream(soapMsg.getBytes());
+<a name="111" href="#111">111</a>         Message msg = <strong>new</strong> Message(in);
+<a name="112" href="#112">112</a>         msg.setMessageContext(msgContext);
+<a name="113" href="#113">113</a>         <strong>return</strong> msg.getSOAPEnvelope();
+<a name="114" href="#114">114</a>     }
+<a name="115" href="#115">115</a> 
+<a name="116" href="#116">116</a>     <em>/**<em>*</em></em>
+<a name="117" href="#117">117</a> <em>     * Test that signs and verifies a WS-Security envelope.</em>
+<a name="118" href="#118">118</a> <em>     * The test uses the ThumbprintSHA1 key identifier type. </em>
+<a name="119" href="#119">119</a> <em>     * &lt;p/></em>
+<a name="120" href="#120">120</a> <em>     * </em>
+<a name="121" href="#121">121</a> <em>     * @throws java.lang.Exception Thrown when there is any problem in signing or verification</em>
+<a name="122" href="#122">122</a> <em>     */</em>
+<a name="123" href="#123">123</a>     <strong>public</strong> <strong>void</strong> testX509SignatureThumb() throws Exception {
+<a name="124" href="#124">124</a>         SOAPEnvelope envelope = <strong>null</strong>;
+<a name="125" href="#125">125</a>         WSSecSignature builder = <strong>new</strong> WSSecSignature();
+<a name="126" href="#126">126</a>         builder.setUserInfo(<span class="string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>, <span class="string">"security"</span>);
+<a name="127" href="#127">127</a>         builder.setKeyIdentifierType(WSConstants.THUMBPRINT_IDENTIFIER);
+<a name="128" href="#128">128</a>         <em class="comment">// builder.setUserInfo("john", "keypass");</em>
+<a name="129" href="#129">129</a>         log.info(<span class="string">"Before Signing ThumbprintSHA1...."</span>);
+<a name="130" href="#130">130</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="131" href="#131">131</a>         
+<a name="132" href="#132">132</a>         WSSecHeader secHeader = <strong>new</strong> WSSecHeader();
+<a name="133" href="#133">133</a>         secHeader.insertSecurityHeader(doc);
+<a name="134" href="#134">134</a> 
+<a name="135" href="#135">135</a>         Document signedDoc = builder.build(doc, crypto, secHeader);
+<a name="136" href="#136">136</a> 
+<a name="137" href="#137">137</a>         <em class="comment">/*</em>
+<a name="138" href="#138">138</a> <em class="comment">         * convert the resulting document into a message first. The toSOAPMessage()</em>
+<a name="139" href="#139">139</a> <em class="comment">         * mehtod performs the necessary c14n call to properly set up the signed</em>
+<a name="140" href="#140">140</a> <em class="comment">         * document and convert it into a SOAP message. After that we extract it</em>
+<a name="141" href="#141">141</a> <em class="comment">         * as a document again for further processing.</em>
+<a name="142" href="#142">142</a> <em class="comment">         */</em>
+<a name="143" href="#143">143</a> 
+<a name="144" href="#144">144</a>         Message signedMsg = (Message) SOAPUtil.toSOAPMessage(signedDoc);
+<a name="145" href="#145">145</a>         <strong>if</strong> (log.isDebugEnabled()) {
+<a name="146" href="#146">146</a>             log.debug(<span class="string">"Signed message with ThumbprintSHA1 key identifier:"</span>);
+<a name="147" href="#147">147</a>             XMLUtils.PrettyElementToWriter(signedMsg.getSOAPEnvelope().getAsDOM(), <strong>new</strong> PrintWriter(System.out));
+<a name="148" href="#148">148</a>         }
+<a name="149" href="#149">149</a>         signedDoc = signedMsg.getSOAPEnvelope().getAsDocument();
+<a name="150" href="#150">150</a>         log.info(<span class="string">"After Signing ThumbprintSHA1...."</span>);
+<a name="151" href="#151">151</a>         verify(signedDoc);
+<a name="152" href="#152">152</a>     }
+<a name="153" href="#153">153</a> 
+<a name="154" href="#154">154</a>     <em>/**<em>*</em></em>
+<a name="155" href="#155">155</a> <em>     * Test that signs (twice) and verifies a WS-Security envelope.</em>
+<a name="156" href="#156">156</a> <em>     * The test uses the ThumbprintSHA1 key identifier type.</em>
+<a name="157" href="#157">157</a> <em>     * &lt;p/></em>
+<a name="158" href="#158">158</a> <em>     * </em>
+<a name="159" href="#159">159</a> <em>     * @throws java.lang.Exception Thrown when there is any problem in signing or verification</em>
+<a name="160" href="#160">160</a> <em>     */</em>
+<a name="161" href="#161">161</a>     <strong>public</strong> <strong>void</strong> testDoubleX509SignatureThumb() throws Exception {
+<a name="162" href="#162">162</a>         SOAPEnvelope envelope = <strong>null</strong>;
+<a name="163" href="#163">163</a>         WSSecSignature builder = <strong>new</strong> WSSecSignature();
+<a name="164" href="#164">164</a>         builder.setUserInfo(<span class="string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>, <span class="string">"security"</span>);
+<a name="165" href="#165">165</a>         <em class="comment">// builder.setUserInfo("john", "keypass");</em>
+<a name="166" href="#166">166</a>         builder.setKeyIdentifierType(WSConstants.THUMBPRINT_IDENTIFIER);        
+<a name="167" href="#167">167</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="168" href="#168">168</a>         
+<a name="169" href="#169">169</a>         WSSecHeader secHeader = <strong>new</strong> WSSecHeader();
+<a name="170" href="#170">170</a>         secHeader.insertSecurityHeader(doc);
+<a name="171" href="#171">171</a> 
+<a name="172" href="#172">172</a>         Document signedDoc = builder.build(doc, crypto, secHeader);
+<a name="173" href="#173">173</a>         Document signedDoc1 = builder.build(signedDoc, crypto, secHeader);
+<a name="174" href="#174">174</a>         verify(signedDoc1);
+<a name="175" href="#175">175</a>     }
+<a name="176" href="#176">176</a> 
+<a name="177" href="#177">177</a>     <em>/**<em>*</em></em>
+<a name="178" href="#178">178</a> <em>     * Verifies the soap envelope.</em>
+<a name="179" href="#179">179</a> <em>     * This method verfies all the signature generated. </em>
+<a name="180" href="#180">180</a> <em>     * </em>
+<a name="181" href="#181">181</a> <em>     * @param env soap envelope</em>
+<a name="182" href="#182">182</a> <em>     * @throws java.lang.Exception Thrown when there is a problem in verification</em>
+<a name="183" href="#183">183</a> <em>     */</em>
+<a name="184" href="#184">184</a>     <strong>private</strong> <strong>void</strong> verify(Document doc) throws Exception {
+<a name="185" href="#185">185</a>         secEngine.processSecurityHeader(doc, <strong>null</strong>, <strong>null</strong>, crypto);
+<a name="186" href="#186">186</a>     }
+<a name="187" href="#187">187</a> }
+</pre>
+<hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
+</html>
+

Added: webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew15.html
URL: http://svn.apache.org/viewcvs/webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew15.html?rev=398880&view=auto
==============================================================================
--- webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew15.html (added)
+++ webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew15.html Tue May  2 02:36:22 2006
@@ -0,0 +1,271 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" /><title>TestWSSecurityNew15 xref</title>
+<link type="text/css" rel="stylesheet" href="../stylesheet.css" />
+</head>
+<body>
+<pre>
+
+<a name="1" href="#1">1</a>   <em class="comment">/*</em>
+<a name="2" href="#2">2</a>   <em class="comment"> * Copyright  2003-2004 The Apache Software Foundation.</em>
+<a name="3" href="#3">3</a>   <em class="comment"> *</em>
+<a name="4" href="#4">4</a>   <em class="comment"> *  Licensed under the Apache License, Version 2.0 (the "License");</em>
+<a name="5" href="#5">5</a>   <em class="comment"> *  you may not use this file except in compliance with the License.</em>
+<a name="6" href="#6">6</a>   <em class="comment"> *  You may obtain a copy of the License at</em>
+<a name="7" href="#7">7</a>   <em class="comment"> *</em>
+<a name="8" href="#8">8</a>   <em class="comment"> *      <a href="http://www.apache.org/licenses/LICENSE-2.0" target="alexandria_uri">http://www.apache.org/licenses/LICENSE-2.0</a></em>
+<a name="9" href="#9">9</a>   <em class="comment"> *</em>
+<a name="10" href="#10">10</a>  <em class="comment"> *  Unless required by applicable law or agreed to in writing, software</em>
+<a name="11" href="#11">11</a>  <em class="comment"> *  distributed under the License is distributed on an "AS IS" BASIS,</em>
+<a name="12" href="#12">12</a>  <em class="comment"> *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.</em>
+<a name="13" href="#13">13</a>  <em class="comment"> *  See the License for the specific language governing permissions and</em>
+<a name="14" href="#14">14</a>  <em class="comment"> *  limitations under the License.</em>
+<a name="15" href="#15">15</a>  <em class="comment"> *</em>
+<a name="16" href="#16">16</a>  <em class="comment"> */</em>
+<a name="17" href="#17">17</a>  
+<a name="18" href="#18">18</a>  <strong>package</strong> <a href="../wssec/package-summary.html">wssec</a>;
+<a name="19" href="#19">19</a>  
+<a name="20" href="#20">20</a>  <strong>import</strong> junit.framework.Test;
+<a name="21" href="#21">21</a>  <strong>import</strong> junit.framework.TestCase;
+<a name="22" href="#22">22</a>  <strong>import</strong> junit.framework.TestSuite;
+<a name="23" href="#23">23</a>  <strong>import</strong> org.apache.axis.Message;
+<a name="24" href="#24">24</a>  <strong>import</strong> org.apache.axis.MessageContext;
+<a name="25" href="#25">25</a>  <strong>import</strong> org.apache.axis.client.AxisClient;
+<a name="26" href="#26">26</a>  <strong>import</strong> org.apache.axis.utils.XMLUtils;
+<a name="27" href="#27">27</a>  <strong>import</strong> org.apache.axis.configuration.NullProvider;
+<a name="28" href="#28">28</a>  <strong>import</strong> org.apache.axis.message.SOAPEnvelope;
+<a name="29" href="#29">29</a>  <strong>import</strong> org.apache.commons.logging.Log;
+<a name="30" href="#30">30</a>  <strong>import</strong> org.apache.commons.logging.LogFactory;
+<a name="31" href="#31">31</a>  <strong>import</strong> org.apache.ws.security.SOAPConstants;
+<a name="32" href="#32">32</a>  <strong>import</strong> org.apache.ws.security.WSConstants;
+<a name="33" href="#33">33</a>  <strong>import</strong> org.apache.ws.security.WSPasswordCallback;
+<a name="34" href="#34">34</a>  <strong>import</strong> org.apache.ws.security.WSSecurityEngine;
+<a name="35" href="#35">35</a>  <strong>import</strong> org.apache.ws.security.WSEncryptionPart;
+<a name="36" href="#36">36</a>  <strong>import</strong> org.apache.ws.security.components.crypto.Crypto;
+<a name="37" href="#37">37</a>  <strong>import</strong> org.apache.ws.security.components.crypto.CryptoFactory;
+<a name="38" href="#38">38</a>  <strong>import</strong> org.apache.ws.security.message.WSSecEncrypt;
+<a name="39" href="#39">39</a>  <strong>import</strong> org.apache.ws.security.message.WSSecHeader;
+<a name="40" href="#40">40</a>  <strong>import</strong> org.apache.ws.security.util.WSSecurityUtil;
+<a name="41" href="#41">41</a>  <strong>import</strong> org.w3c.dom.Document;
+<a name="42" href="#42">42</a>  <strong>import</strong> org.w3c.dom.Element;
+<a name="43" href="#43">43</a>  
+<a name="44" href="#44">44</a>  <strong>import</strong> javax.security.auth.callback.Callback;
+<a name="45" href="#45">45</a>  <strong>import</strong> javax.security.auth.callback.CallbackHandler;
+<a name="46" href="#46">46</a>  <strong>import</strong> javax.security.auth.callback.UnsupportedCallbackException;
+<a name="47" href="#47">47</a>  <strong>import</strong> java.io.ByteArrayInputStream;
+<a name="48" href="#48">48</a>  <strong>import</strong> java.io.IOException;
+<a name="49" href="#49">49</a>  <strong>import</strong> java.io.InputStream;
+<a name="50" href="#50">50</a>  <strong>import</strong> java.io.PrintWriter;
+<a name="51" href="#51">51</a>  
+<a name="52" href="#52">52</a>  <strong>import</strong> java.util.Vector;
+<a name="53" href="#53">53</a>  
+<a name="54" href="#54">54</a>  <em>/**<em>*</em></em>
+<a name="55" href="#55">55</a>  <em> * Test that encrypt and decrypt a WS-Security envelope.</em>
+<a name="56" href="#56">56</a>  <em> * </em>
+<a name="57" href="#57">57</a>  <em> * This test uses the RSA_15 alogrithm to transport (wrap) the symmetric key.</em>
+<a name="58" href="#58">58</a>  <em> * The test case creates a ReferenceList element that references EncryptedData</em>
+<a name="59" href="#59">59</a>  <em> * elements. The ReferencesList element is put into the Security header, not</em>
+<a name="60" href="#60">60</a>  <em> * as child of the EncryptedKey. The EncryptedData elements contain a KeyInfo</em>
+<a name="61" href="#61">61</a>  <em> * that references the EncryptedKey via a STR/Reference structure.</em>
+<a name="62" href="#62">62</a>  <em> * </em>
+<a name="63" href="#63">63</a>  <em> * &lt;p/></em>
+<a name="64" href="#64">64</a>  <em> * </em>
+<a name="65" href="#65">65</a>  <em> * Refer to OASIS WS Security spec 1.1, chap 7.7</em>
+<a name="66" href="#66">66</a>  <em> * </em>
+<a name="67" href="#67">67</a>  <em> * @author Davanum Srinivas (dims@yahoo.com)</em>
+<a name="68" href="#68">68</a>  <em> * @author Werner Dittmann (werner@apache.org)</em>
+<a name="69" href="#69">69</a>  <em> */</em>
+<a name="70" href="#70">70</a>  <strong>public</strong> <strong>class</strong> TestWSSecurityNew15 <strong>extends</strong> TestCase implements CallbackHandler {
+<a name="71" href="#71">71</a>  	<strong>private</strong> <strong>static</strong> Log log = LogFactory.getLog(TestWSSecurityNew15.<strong>class</strong>);
+<a name="72" href="#72">72</a>  
+<a name="73" href="#73">73</a>  	<strong>static</strong> <strong>final</strong> String soapMsg = <span class="string">"&lt;?xml version=\&quot;1.0\&quot; encoding=\&quot;UTF-8\&quot;?>"</span>
+<a name="74" href="#74">74</a>  			+ <span class="string">"&lt;soapenv:Envelope xmlns:soapenv=\&quot;http://schemas.xmlsoap.org/soap/envelope/\&quot; xmlns:xsd=\&quot;http://www.w3.org/2001/XMLSchema\&quot; xmlns:xsi=\&quot;http://www.w3.org/2001/XMLSchema-instance\&quot;>"</span>
+<a name="75" href="#75">75</a>  			+ <span class="string">"   &lt;soapenv:Body>"</span>
+<a name="76" href="#76">76</a>  			+ <span class="string">"      &lt;ns1:testMethod xmlns:ns1=\&quot;uri:LogTestService2\&quot;>&lt;/ns1:testMethod>"</span>
+<a name="77" href="#77">77</a>  			+ <span class="string">"   &lt;/soapenv:Body>"</span> + <span class="string">"&lt;/soapenv:Envelope>"</span>;
+<a name="78" href="#78">78</a>  
+<a name="79" href="#79">79</a>  	<strong>static</strong> <strong>final</strong> WSSecurityEngine secEngine = <strong>new</strong> WSSecurityEngine();
+<a name="80" href="#80">80</a>  
+<a name="81" href="#81">81</a>  	<strong>static</strong> <strong>final</strong> Crypto crypto = CryptoFactory
+<a name="82" href="#82">82</a>  			.getInstance(<span class="string">"cryptoSKI.properties"</span>);
+<a name="83" href="#83">83</a>  
+<a name="84" href="#84">84</a>  	MessageContext msgContext;
+<a name="85" href="#85">85</a>  
+<a name="86" href="#86">86</a>  	Message message;
+<a name="87" href="#87">87</a>  
+<a name="88" href="#88">88</a>  	<em>/**<em>*</em></em>
+<a name="89" href="#89">89</a>  <em>	 * TestWSSecurity constructor &lt;p/></em>
+<a name="90" href="#90">90</a>  <em>	 * </em>
+<a name="91" href="#91">91</a>  <em>	 * @param name</em>
+<a name="92" href="#92">92</a>  <em>	 *            name of the test</em>
+<a name="93" href="#93">93</a>  <em>	 */</em>
+<a name="94" href="#94">94</a>  	<strong>public</strong> TestWSSecurityNew15(String name) {
+<a name="95" href="#95">95</a>  		<strong>super</strong>(name);
+<a name="96" href="#96">96</a>  	}
+<a name="97" href="#97">97</a>  
+<a name="98" href="#98">98</a>  	<em>/**<em>*</em></em>
+<a name="99" href="#99">99</a>  <em>	 * JUnit suite &lt;p/></em>
+<a name="100" href="#100">100</a> <em>	 * </em>
+<a name="101" href="#101">101</a> <em>	 * @return a junit test suite</em>
+<a name="102" href="#102">102</a> <em>	 */</em>
+<a name="103" href="#103">103</a> 	<strong>public</strong> <strong>static</strong> Test suite() {
+<a name="104" href="#104">104</a> 		<strong>return</strong> <strong>new</strong> TestSuite(TestWSSecurityNew15.<strong>class</strong>);
+<a name="105" href="#105">105</a> 	}
+<a name="106" href="#106">106</a> 
+<a name="107" href="#107">107</a> 	<em>/**<em>*</em></em>
+<a name="108" href="#108">108</a> <em>	 * Main method &lt;p/></em>
+<a name="109" href="#109">109</a> <em>	 * </em>
+<a name="110" href="#110">110</a> <em>	 * @param args</em>
+<a name="111" href="#111">111</a> <em>	 *            command line args</em>
+<a name="112" href="#112">112</a> <em>	 */</em>
+<a name="113" href="#113">113</a> 	<strong>public</strong> <strong>static</strong> <strong>void</strong> main(String[] args) {
+<a name="114" href="#114">114</a> 		junit.textui.TestRunner.run(suite());
+<a name="115" href="#115">115</a> 	}
+<a name="116" href="#116">116</a> 
+<a name="117" href="#117">117</a> 	<em>/**<em>*</em></em>
+<a name="118" href="#118">118</a> <em>	 * Setup method &lt;p/></em>
+<a name="119" href="#119">119</a> <em>	 * </em>
+<a name="120" href="#120">120</a> <em>	 * @throws Exception</em>
+<a name="121" href="#121">121</a> <em>	 *             Thrown when there is a problem in setup</em>
+<a name="122" href="#122">122</a> <em>	 */</em>
+<a name="123" href="#123">123</a> 	<strong>protected</strong> <strong>void</strong> setUp() throws Exception {
+<a name="124" href="#124">124</a> 		AxisClient tmpEngine = <strong>new</strong> AxisClient(<strong>new</strong> NullProvider());
+<a name="125" href="#125">125</a> 		msgContext = <strong>new</strong> MessageContext(tmpEngine);
+<a name="126" href="#126">126</a> 		message = getSOAPMessage();
+<a name="127" href="#127">127</a> 	}
+<a name="128" href="#128">128</a> 
+<a name="129" href="#129">129</a> 	<em>/**<em>*</em></em>
+<a name="130" href="#130">130</a> <em>	 * Constructs a soap envelope &lt;p/></em>
+<a name="131" href="#131">131</a> <em>	 * </em>
+<a name="132" href="#132">132</a> <em>	 * @return soap envelope</em>
+<a name="133" href="#133">133</a> <em>	 * @throws Exception</em>
+<a name="134" href="#134">134</a> <em>	 *             if there is any problem constructing the soap envelope</em>
+<a name="135" href="#135">135</a> <em>	 */</em>
+<a name="136" href="#136">136</a> 	<strong>protected</strong> Message getSOAPMessage() throws Exception {
+<a name="137" href="#137">137</a> 		InputStream in = <strong>new</strong> ByteArrayInputStream(soapMsg.getBytes());
+<a name="138" href="#138">138</a> 		Message msg = <strong>new</strong> Message(in);
+<a name="139" href="#139">139</a> 		msg.setMessageContext(msgContext);
+<a name="140" href="#140">140</a> 		<strong>return</strong> msg;
+<a name="141" href="#141">141</a> 	}
+<a name="142" href="#142">142</a> 
+<a name="143" href="#143">143</a> 	<em>/**<em>*</em></em>
+<a name="144" href="#144">144</a> <em>	 * Test that encrypt and decrypt a WS-Security envelope.</em>
+<a name="145" href="#145">145</a> <em>	 * </em>
+<a name="146" href="#146">146</a> <em>	 * This test uses the RSA_15 alogrithm to transport (wrap) the symmetric</em>
+<a name="147" href="#147">147</a> <em>	 * key.</em>
+<a name="148" href="#148">148</a> <em>	 * </em>
+<a name="149" href="#149">149</a> <em>	 * @throws Exception</em>
+<a name="150" href="#150">150</a> <em>	 *             Thrown when there is any problem in signing or verification</em>
+<a name="151" href="#151">151</a> <em>	 */</em>
+<a name="152" href="#152">152</a> 	<strong>public</strong> <strong>void</strong> testEncryptionDecryptionRSA15() throws Exception {
+<a name="153" href="#153">153</a> 		SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
+<a name="154" href="#154">154</a> 		SOAPEnvelope envelope = <strong>null</strong>;
+<a name="155" href="#155">155</a> 		WSSecEncrypt builder = <strong>new</strong> WSSecEncrypt();
+<a name="156" href="#156">156</a> 		builder.setUserInfo(<span class="string">"wss4jcert"</span>);
+<a name="157" href="#157">157</a> 		builder.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
+<a name="158" href="#158">158</a> 		builder.setSymmetricEncAlgorithm(WSConstants.TRIPLE_DES);
+<a name="159" href="#159">159</a> 		Document doc = unsignedEnvelope.getAsDocument();
+<a name="160" href="#160">160</a> 		WSSecHeader secHeader = <strong>new</strong> WSSecHeader();
+<a name="161" href="#161">161</a> 		secHeader.insertSecurityHeader(doc);
+<a name="162" href="#162">162</a> 		log.info(<span class="string">"Before Encryption Triple DES...."</span>);
+<a name="163" href="#163">163</a> 
+<a name="164" href="#164">164</a> 		<em class="comment">/*</em>
+<a name="165" href="#165">165</a> <em class="comment">		 * Prepare the Encrypt object with the token, setup data structure</em>
+<a name="166" href="#166">166</a> <em class="comment">		 */</em>
+<a name="167" href="#167">167</a> 		builder.prepare(doc, crypto);
+<a name="168" href="#168">168</a> 
+<a name="169" href="#169">169</a> 		<em class="comment">/*</em>
+<a name="170" href="#170">170</a> <em class="comment">		 * Set up the parts structure to encrypt the body</em>
+<a name="171" href="#171">171</a> <em class="comment">		 */</em>
+<a name="172" href="#172">172</a> 		SOAPConstants soapConstants = WSSecurityUtil.getSOAPConstants(doc
+<a name="173" href="#173">173</a> 				.getDocumentElement());
+<a name="174" href="#174">174</a> 		Vector parts = <strong>new</strong> Vector();
+<a name="175" href="#175">175</a> 		WSEncryptionPart encP = <strong>new</strong> WSEncryptionPart(soapConstants
+<a name="176" href="#176">176</a> 				.getBodyQName().getLocalPart(), soapConstants.getEnvelopeURI(),
+<a name="177" href="#177">177</a> 				<span class="string">"Content"</span>);
+<a name="178" href="#178">178</a> 		parts.add(encP);
+<a name="179" href="#179">179</a> 
+<a name="180" href="#180">180</a> 		<em class="comment">/*</em>
+<a name="181" href="#181">181</a> <em class="comment">		 * Encrypt the parts (Body), create EncrypedData elements that reference</em>
+<a name="182" href="#182">182</a> <em class="comment">		 * the EncryptedKey, and get a ReferenceList that can be put into the</em>
+<a name="183" href="#183">183</a> <em class="comment">		 * Security header. Be sure that the ReferenceList is after the</em>
+<a name="184" href="#184">184</a> <em class="comment">		 * EncryptedKey element in the Security header (strict layout)</em>
+<a name="185" href="#185">185</a> <em class="comment">		 */</em>
+<a name="186" href="#186">186</a> 		Element refs = builder.encryptForExternalRef(<strong>null</strong>, parts);
+<a name="187" href="#187">187</a> 		builder.addExternalRefElement(refs, secHeader);
+<a name="188" href="#188">188</a> 
+<a name="189" href="#189">189</a> 		<em class="comment">/*</em>
+<a name="190" href="#190">190</a> <em class="comment">		 * now add (prepend) the EncryptedKey element, then a</em>
+<a name="191" href="#191">191</a> <em class="comment">		 * BinarySecurityToken if one was setup during prepare</em>
+<a name="192" href="#192">192</a> <em class="comment">		 */</em>
+<a name="193" href="#193">193</a> 		builder.prependToHeader(secHeader);
+<a name="194" href="#194">194</a> 
+<a name="195" href="#195">195</a> 		builder.prependBSTElementToHeader(secHeader);
+<a name="196" href="#196">196</a> 
+<a name="197" href="#197">197</a> 		Document encryptedDoc = doc;
+<a name="198" href="#198">198</a> 		log.info(<span class="string">"After Encryption Triple DES...."</span>);
+<a name="199" href="#199">199</a> 
+<a name="200" href="#200">200</a> 		<em class="comment">/*</em>
+<a name="201" href="#201">201</a> <em class="comment">		 * convert the resulting document into a message first. The</em>
+<a name="202" href="#202">202</a> <em class="comment">		 * toSOAPMessage() method performs the necessary c14n call to properly</em>
+<a name="203" href="#203">203</a> <em class="comment">		 * set up the signed document and convert it into a SOAP message. Check</em>
+<a name="204" href="#204">204</a> <em class="comment">		 * that the contents can't be read (checking if we can find a specific</em>
+<a name="205" href="#205">205</a> <em class="comment">		 * substring). After that we extract it as a document again for further</em>
+<a name="206" href="#206">206</a> <em class="comment">		 * processing.</em>
+<a name="207" href="#207">207</a> <em class="comment">		 */</em>
+<a name="208" href="#208">208</a> 
+<a name="209" href="#209">209</a> 		Message encryptedMsg = (Message) SOAPUtil.toSOAPMessage(encryptedDoc);
+<a name="210" href="#210">210</a> 		<strong>if</strong> (log.isDebugEnabled()) {
+<a name="211" href="#211">211</a> 			log.debug(<span class="string">"Encrypted message, RSA-15 keytransport, 3DES:"</span>);
+<a name="212" href="#212">212</a> 			XMLUtils.PrettyElementToWriter(encryptedMsg.getSOAPEnvelope()
+<a name="213" href="#213">213</a> 					.getAsDOM(), <strong>new</strong> PrintWriter(System.out));
+<a name="214" href="#214">214</a> 		}
+<a name="215" href="#215">215</a> 		String encryptedString = encryptedMsg.getSOAPPartAsString();
+<a name="216" href="#216">216</a> 		assertTrue(encryptedString.indexOf(<span class="string">"LogTestService2"</span>) == -1 ? <strong>true</strong>
+<a name="217" href="#217">217</a> 				: false);
+<a name="218" href="#218">218</a> 		encryptedDoc = encryptedMsg.getSOAPEnvelope().getAsDocument();
+<a name="219" href="#219">219</a> 		verify(encryptedDoc);
+<a name="220" href="#220">220</a> 	}
+<a name="221" href="#221">221</a> 
+<a name="222" href="#222">222</a> 	<em>/**<em>*</em></em>
+<a name="223" href="#223">223</a> <em>	 * Verifies the soap envelope &lt;p/></em>
+<a name="224" href="#224">224</a> <em>	 * </em>
+<a name="225" href="#225">225</a> <em>	 * @param envelope</em>
+<a name="226" href="#226">226</a> <em>	 * @throws Exception</em>
+<a name="227" href="#227">227</a> <em>	 *             Thrown when there is a problem in verification</em>
+<a name="228" href="#228">228</a> <em>	 */</em>
+<a name="229" href="#229">229</a> 	<strong>private</strong> <strong>void</strong> verify(Document doc) throws Exception {
+<a name="230" href="#230">230</a> 		secEngine.processSecurityHeader(doc, <strong>null</strong>, <strong>this</strong>, crypto);
+<a name="231" href="#231">231</a> 		SOAPUtil.updateSOAPMessage(doc, message);
+<a name="232" href="#232">232</a> 		String decryptedString = message.getSOAPPartAsString();
+<a name="233" href="#233">233</a> 		<strong>if</strong> (log.isDebugEnabled()) {
+<a name="234" href="#234">234</a> 			System.out.println(<span class="string">"\n"</span> + decryptedString + <span class="string">"\n"</span>);
+<a name="235" href="#235">235</a> 		}
+<a name="236" href="#236">236</a> 		assertTrue(decryptedString.indexOf(<span class="string">"LogTestService2"</span>) > 0 ? <strong>true</strong>
+<a name="237" href="#237">237</a> 				: false);
+<a name="238" href="#238">238</a> 	}
+<a name="239" href="#239">239</a> 
+<a name="240" href="#240">240</a> 	<strong>public</strong> <strong>void</strong> handle(Callback[] callbacks) throws IOException,
+<a name="241" href="#241">241</a> 			UnsupportedCallbackException {
+<a name="242" href="#242">242</a> 		<strong>for</strong> (<strong>int</strong> i = 0; i &lt; callbacks.length; i++) {
+<a name="243" href="#243">243</a> 			<strong>if</strong> (callbacks[i] instanceof WSPasswordCallback) {
+<a name="244" href="#244">244</a> 				WSPasswordCallback pc = (WSPasswordCallback) callbacks[i];
+<a name="245" href="#245">245</a> 				<em class="comment">/*</em>
+<a name="246" href="#246">246</a> <em class="comment">				 * here call a function/method to lookup the password for the</em>
+<a name="247" href="#247">247</a> <em class="comment">				 * given identifier (e.g. a user name or keystore alias) e.g.:</em>
+<a name="248" href="#248">248</a> <em class="comment">				 * pc.setPassword(passStore.getPassword(pc.getIdentfifier)) for</em>
+<a name="249" href="#249">249</a> <em class="comment">				 * Testing we supply a fixed name here.</em>
+<a name="250" href="#250">250</a> <em class="comment">				 */</em>
+<a name="251" href="#251">251</a> 				pc.setPassword(<span class="string">"security"</span>);
+<a name="252" href="#252">252</a> 			} <strong>else</strong> {
+<a name="253" href="#253">253</a> 				<strong>throw</strong> <strong>new</strong> UnsupportedCallbackException(callbacks[i],
+<a name="254" href="#254">254</a> 						<span class="string">"Unrecognized Callback"</span>);
+<a name="255" href="#255">255</a> 			}
+<a name="256" href="#256">256</a> 		}
+<a name="257" href="#257">257</a> 	}
+<a name="258" href="#258">258</a> }
+</pre>
+<hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
+</html>
+

Added: webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew2.html
URL: http://svn.apache.org/viewcvs/webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew2.html?rev=398880&view=auto
==============================================================================
--- webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew2.html (added)
+++ webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew2.html Tue May  2 02:36:22 2006
@@ -0,0 +1,277 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" /><title>TestWSSecurityNew2 xref</title>
+<link type="text/css" rel="stylesheet" href="../stylesheet.css" />
+</head>
+<body>
+<pre>
+
+<a name="1" href="#1">1</a>   <em class="comment">/*</em>
+<a name="2" href="#2">2</a>   <em class="comment"> * Copyright  2003-2004 The Apache Software Foundation.</em>
+<a name="3" href="#3">3</a>   <em class="comment"> *</em>
+<a name="4" href="#4">4</a>   <em class="comment"> *  Licensed under the Apache License, Version 2.0 (the "License");</em>
+<a name="5" href="#5">5</a>   <em class="comment"> *  you may not use this file except in compliance with the License.</em>
+<a name="6" href="#6">6</a>   <em class="comment"> *  You may obtain a copy of the License at</em>
+<a name="7" href="#7">7</a>   <em class="comment"> *</em>
+<a name="8" href="#8">8</a>   <em class="comment"> *      <a href="http://www.apache.org/licenses/LICENSE-2.0" target="alexandria_uri">http://www.apache.org/licenses/LICENSE-2.0</a></em>
+<a name="9" href="#9">9</a>   <em class="comment"> *</em>
+<a name="10" href="#10">10</a>  <em class="comment"> *  Unless required by applicable law or agreed to in writing, software</em>
+<a name="11" href="#11">11</a>  <em class="comment"> *  distributed under the License is distributed on an "AS IS" BASIS,</em>
+<a name="12" href="#12">12</a>  <em class="comment"> *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.</em>
+<a name="13" href="#13">13</a>  <em class="comment"> *  See the License for the specific language governing permissions and</em>
+<a name="14" href="#14">14</a>  <em class="comment"> *  limitations under the License.</em>
+<a name="15" href="#15">15</a>  <em class="comment"> *</em>
+<a name="16" href="#16">16</a>  <em class="comment"> */</em>
+<a name="17" href="#17">17</a>  
+<a name="18" href="#18">18</a>  <strong>package</strong> <a href="../wssec/package-summary.html">wssec</a>;
+<a name="19" href="#19">19</a>  
+<a name="20" href="#20">20</a>  <strong>import</strong> junit.framework.Test;
+<a name="21" href="#21">21</a>  <strong>import</strong> junit.framework.TestCase;
+<a name="22" href="#22">22</a>  <strong>import</strong> junit.framework.TestSuite;
+<a name="23" href="#23">23</a>  <strong>import</strong> org.apache.axis.Message;
+<a name="24" href="#24">24</a>  <strong>import</strong> org.apache.axis.MessageContext;
+<a name="25" href="#25">25</a>  <strong>import</strong> org.apache.axis.client.AxisClient;
+<a name="26" href="#26">26</a>  <strong>import</strong> org.apache.axis.utils.XMLUtils;
+<a name="27" href="#27">27</a>  <strong>import</strong> org.apache.axis.configuration.NullProvider;
+<a name="28" href="#28">28</a>  <strong>import</strong> org.apache.axis.message.SOAPEnvelope;
+<a name="29" href="#29">29</a>  <strong>import</strong> org.apache.commons.logging.Log;
+<a name="30" href="#30">30</a>  <strong>import</strong> org.apache.commons.logging.LogFactory;
+<a name="31" href="#31">31</a>  <strong>import</strong> org.apache.ws.security.WSConstants;
+<a name="32" href="#32">32</a>  <strong>import</strong> org.apache.ws.security.WSPasswordCallback;
+<a name="33" href="#33">33</a>  <strong>import</strong> org.apache.ws.security.WSSecurityEngine;
+<a name="34" href="#34">34</a>  <strong>import</strong> org.apache.ws.security.WSEncryptionPart;
+<a name="35" href="#35">35</a>  <strong>import</strong> org.apache.ws.security.components.crypto.Crypto;
+<a name="36" href="#36">36</a>  <strong>import</strong> org.apache.ws.security.components.crypto.CryptoFactory;
+<a name="37" href="#37">37</a>  <strong>import</strong> org.apache.ws.security.message.WSSecEncrypt;
+<a name="38" href="#38">38</a>  <strong>import</strong> org.apache.ws.security.message.WSSecHeader;
+<a name="39" href="#39">39</a>  <strong>import</strong> org.w3c.dom.Document;
+<a name="40" href="#40">40</a>  
+<a name="41" href="#41">41</a>  <strong>import</strong> javax.security.auth.callback.Callback;
+<a name="42" href="#42">42</a>  <strong>import</strong> javax.security.auth.callback.CallbackHandler;
+<a name="43" href="#43">43</a>  <strong>import</strong> javax.security.auth.callback.UnsupportedCallbackException;
+<a name="44" href="#44">44</a>  <strong>import</strong> java.io.ByteArrayInputStream;
+<a name="45" href="#45">45</a>  <strong>import</strong> java.io.IOException;
+<a name="46" href="#46">46</a>  <strong>import</strong> java.io.InputStream;
+<a name="47" href="#47">47</a>  <strong>import</strong> java.io.PrintWriter;
+<a name="48" href="#48">48</a>  
+<a name="49" href="#49">49</a>  <strong>import</strong> java.util.Vector;
+<a name="50" href="#50">50</a>  
+<a name="51" href="#51">51</a>  <em>/**<em>*</em></em>
+<a name="52" href="#52">52</a>  <em> * WS-Security Test Case</em>
+<a name="53" href="#53">53</a>  <em> * &lt;p/></em>
+<a name="54" href="#54">54</a>  <em> * </em>
+<a name="55" href="#55">55</a>  <em> * @author Davanum Srinivas (dims@yahoo.com)</em>
+<a name="56" href="#56">56</a>  <em> */</em>
+<a name="57" href="#57">57</a>  <strong>public</strong> <strong>class</strong> TestWSSecurityNew2 <strong>extends</strong> TestCase implements CallbackHandler {
+<a name="58" href="#58">58</a>      <strong>private</strong> <strong>static</strong> Log log = LogFactory.getLog(TestWSSecurityNew2.<strong>class</strong>);
+<a name="59" href="#59">59</a>      <strong>static</strong> <strong>final</strong> String soapMsg = <span class="string">"&lt;?xml version=\&quot;1.0\&quot; encoding=\&quot;UTF-8\&quot;?>"</span> +
+<a name="60" href="#60">60</a>              <span class="string">"&lt;soapenv:Envelope xmlns:soapenv=\&quot;http://schemas.xmlsoap.org/soap/envelope/\&quot; xmlns:xsd=\&quot;http://www.w3.org/2001/XMLSchema\&quot; xmlns:xsi=\&quot;http://www.w3.org/2001/XMLSchema-instance\&quot;>"</span> +
+<a name="61" href="#61">61</a>              <span class="string">"   &lt;soapenv:Body>"</span> +
+<a name="62" href="#62">62</a>              <span class="string">"      &lt;ns1:testMethod xmlns:ns1=\&quot;uri:LogTestService2\&quot;>&lt;/ns1:testMethod>"</span> +
+<a name="63" href="#63">63</a>              <span class="string">"   &lt;/soapenv:Body>"</span> +
+<a name="64" href="#64">64</a>              <span class="string">"&lt;/soapenv:Envelope>"</span>;
+<a name="65" href="#65">65</a>  
+<a name="66" href="#66">66</a>      <strong>static</strong> <strong>final</strong> WSSecurityEngine secEngine = <strong>new</strong> WSSecurityEngine();
+<a name="67" href="#67">67</a>      <strong>static</strong> <strong>final</strong> Crypto crypto = CryptoFactory.getInstance(<span class="string">"cryptoSKI.properties"</span>);
+<a name="68" href="#68">68</a>      MessageContext msgContext;
+<a name="69" href="#69">69</a>      Message message;
+<a name="70" href="#70">70</a>  
+<a name="71" href="#71">71</a>      <em>/**<em>*</em></em>
+<a name="72" href="#72">72</a>  <em>     * TestWSSecurity constructor</em>
+<a name="73" href="#73">73</a>  <em>     * &lt;p/></em>
+<a name="74" href="#74">74</a>  <em>     * </em>
+<a name="75" href="#75">75</a>  <em>     * @param name name of the test</em>
+<a name="76" href="#76">76</a>  <em>     */</em>
+<a name="77" href="#77">77</a>      <strong>public</strong> TestWSSecurityNew2(String name) {
+<a name="78" href="#78">78</a>          <strong>super</strong>(name);
+<a name="79" href="#79">79</a>      }
+<a name="80" href="#80">80</a>  
+<a name="81" href="#81">81</a>      <em>/**<em>*</em></em>
+<a name="82" href="#82">82</a>  <em>     * JUnit suite</em>
+<a name="83" href="#83">83</a>  <em>     * &lt;p/></em>
+<a name="84" href="#84">84</a>  <em>     * </em>
+<a name="85" href="#85">85</a>  <em>     * @return a junit test suite</em>
+<a name="86" href="#86">86</a>  <em>     */</em>
+<a name="87" href="#87">87</a>      <strong>public</strong> <strong>static</strong> Test suite() {
+<a name="88" href="#88">88</a>          <strong>return</strong> <strong>new</strong> TestSuite(TestWSSecurityNew2.<strong>class</strong>);
+<a name="89" href="#89">89</a>      }
+<a name="90" href="#90">90</a>  
+<a name="91" href="#91">91</a>      <em>/**<em>*</em></em>
+<a name="92" href="#92">92</a>  <em>     * Main method</em>
+<a name="93" href="#93">93</a>  <em>     * &lt;p/></em>
+<a name="94" href="#94">94</a>  <em>     * </em>
+<a name="95" href="#95">95</a>  <em>     * @param args command line args</em>
+<a name="96" href="#96">96</a>  <em>     */</em>
+<a name="97" href="#97">97</a>      <strong>public</strong> <strong>static</strong> <strong>void</strong> main(String[] args) {
+<a name="98" href="#98">98</a>          junit.textui.TestRunner.run(suite());
+<a name="99" href="#99">99</a>      }
+<a name="100" href="#100">100</a> 
+<a name="101" href="#101">101</a>     <em>/**<em>*</em></em>
+<a name="102" href="#102">102</a> <em>     * Setup method</em>
+<a name="103" href="#103">103</a> <em>     * &lt;p/></em>
+<a name="104" href="#104">104</a> <em>     * </em>
+<a name="105" href="#105">105</a> <em>     * @throws Exception Thrown when there is a problem in setup</em>
+<a name="106" href="#106">106</a> <em>     */</em>
+<a name="107" href="#107">107</a>     <strong>protected</strong> <strong>void</strong> setUp() throws Exception {
+<a name="108" href="#108">108</a>         AxisClient tmpEngine = <strong>new</strong> AxisClient(<strong>new</strong> NullProvider());
+<a name="109" href="#109">109</a>         msgContext = <strong>new</strong> MessageContext(tmpEngine);
+<a name="110" href="#110">110</a>         message = getSOAPMessage();
+<a name="111" href="#111">111</a>     }
+<a name="112" href="#112">112</a> 
+<a name="113" href="#113">113</a>     <em>/**<em>*</em></em>
+<a name="114" href="#114">114</a> <em>     * Constructs a soap envelope</em>
+<a name="115" href="#115">115</a> <em>     * &lt;p/></em>
+<a name="116" href="#116">116</a> <em>     * </em>
+<a name="117" href="#117">117</a> <em>     * @return soap envelope</em>
+<a name="118" href="#118">118</a> <em>     * @throws Exception if there is any problem constructing the soap envelope</em>
+<a name="119" href="#119">119</a> <em>     */</em>
+<a name="120" href="#120">120</a>     <strong>protected</strong> Message getSOAPMessage() throws Exception {
+<a name="121" href="#121">121</a>         InputStream in = <strong>new</strong> ByteArrayInputStream(soapMsg.getBytes());
+<a name="122" href="#122">122</a>         Message msg = <strong>new</strong> Message(in);
+<a name="123" href="#123">123</a>         msg.setMessageContext(msgContext);
+<a name="124" href="#124">124</a>         <strong>return</strong> msg;
+<a name="125" href="#125">125</a>     }
+<a name="126" href="#126">126</a> 
+<a name="127" href="#127">127</a>     <em>/**<em>*</em></em>
+<a name="128" href="#128">128</a> <em>     * Test that encrypt and decrypt a WS-Security envelope.</em>
+<a name="129" href="#129">129</a> <em>     * This test uses the RSA_15 alogrithm to transport (wrap) the symmetric</em>
+<a name="130" href="#130">130</a> <em>     * key.</em>
+<a name="131" href="#131">131</a> <em>     * &lt;p/></em>
+<a name="132" href="#132">132</a> <em>     * </em>
+<a name="133" href="#133">133</a> <em>     * @throws Exception Thrown when there is any problem in signing or verification</em>
+<a name="134" href="#134">134</a> <em>     */</em>
+<a name="135" href="#135">135</a>     <strong>public</strong> <strong>void</strong> testEncryptionDecryptionRSA15() throws Exception {
+<a name="136" href="#136">136</a>         SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
+<a name="137" href="#137">137</a>         SOAPEnvelope envelope = <strong>null</strong>;
+<a name="138" href="#138">138</a>         WSSecEncrypt builder = <strong>new</strong> WSSecEncrypt();
+<a name="139" href="#139">139</a>         builder.setUserInfo(<span class="string">"wss4jcert"</span>);
+<a name="140" href="#140">140</a>         builder.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
+<a name="141" href="#141">141</a>         builder.setSymmetricEncAlgorithm(WSConstants.TRIPLE_DES);
+<a name="142" href="#142">142</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="143" href="#143">143</a>         WSSecHeader secHeader = <strong>new</strong> WSSecHeader();
+<a name="144" href="#144">144</a>         secHeader.insertSecurityHeader(doc);
+<a name="145" href="#145">145</a>         log.info(<span class="string">"Before Encryption Triple DES...."</span>);
+<a name="146" href="#146">146</a>         Document encryptedDoc = builder.build(doc, crypto, secHeader);
+<a name="147" href="#147">147</a>         log.info(<span class="string">"After Encryption Triple DES...."</span>);
+<a name="148" href="#148">148</a> 
+<a name="149" href="#149">149</a>         <em class="comment">/*</em>
+<a name="150" href="#150">150</a> <em class="comment">         * convert the resulting document into a message first. The toSOAPMessage()</em>
+<a name="151" href="#151">151</a> <em class="comment">         * method performs the necessary c14n call to properly set up the signed</em>
+<a name="152" href="#152">152</a> <em class="comment">         * document and convert it into a SOAP message. Check that the contents can't</em>
+<a name="153" href="#153">153</a> <em class="comment">          * be read (cheching if we can find a specific substring). After that we extract it</em>
+<a name="154" href="#154">154</a> <em class="comment">         * as a document again for further processing.</em>
+<a name="155" href="#155">155</a> <em class="comment">         */</em>
+<a name="156" href="#156">156</a> 
+<a name="157" href="#157">157</a>         Message encryptedMsg = (Message) SOAPUtil.toSOAPMessage(encryptedDoc);
+<a name="158" href="#158">158</a>         <strong>if</strong> (log.isDebugEnabled()) {
+<a name="159" href="#159">159</a>             log.debug(<span class="string">"Encrypted message, RSA-15 keytransport, 3DES:"</span>);
+<a name="160" href="#160">160</a>             XMLUtils.PrettyElementToWriter(encryptedMsg.getSOAPEnvelope().getAsDOM(), <strong>new</strong> PrintWriter(System.out));
+<a name="161" href="#161">161</a>         }
+<a name="162" href="#162">162</a>         String encryptedString = encryptedMsg.getSOAPPartAsString();
+<a name="163" href="#163">163</a>         assertTrue(encryptedString.indexOf(<span class="string">"LogTestService2"</span>) == -1 ? <strong>true</strong> : false);
+<a name="164" href="#164">164</a>         encryptedDoc = encryptedMsg.getSOAPEnvelope().getAsDocument();
+<a name="165" href="#165">165</a>         verify(encryptedDoc);
+<a name="166" href="#166">166</a> 
+<a name="167" href="#167">167</a>         <em class="comment">/*</em>
+<a name="168" href="#168">168</a> <em class="comment">         * second run, same Junit set up, but change encryption method, </em>
+<a name="169" href="#169">169</a> <em class="comment">         * key identification, encryption mode (Element now), and data to encrypt.</em>
+<a name="170" href="#170">170</a> <em class="comment">         * This tests if several runs of different algorithms on same builder/cipher </em>
+<a name="171" href="#171">171</a> <em class="comment">         * setup are ok.</em>
+<a name="172" href="#172">172</a> <em class="comment">         */</em>
+<a name="173" href="#173">173</a>         message = getSOAPMessage(); <em class="comment">// create fresh message envrionment</em>
+<a name="174" href="#174">174</a>         builder.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
+<a name="175" href="#175">175</a>         builder.setSymmetricEncAlgorithm(WSConstants.AES_128);
+<a name="176" href="#176">176</a>         Vector parts = <strong>new</strong> Vector();
+<a name="177" href="#177">177</a>         WSEncryptionPart encP =
+<a name="178" href="#178">178</a>             <strong>new</strong> WSEncryptionPart(<span class="string">"testMethod"</span>, <span class="string">"uri:LogTestService2"</span>, <span class="string">"Element"</span>);
+<a name="179" href="#179">179</a>         parts.add(encP);
+<a name="180" href="#180">180</a>         builder.setParts(parts);
+<a name="181" href="#181">181</a>         unsignedEnvelope = message.getSOAPEnvelope();
+<a name="182" href="#182">182</a>         doc = unsignedEnvelope.getAsDocument();
+<a name="183" href="#183">183</a>         secHeader = <strong>new</strong> WSSecHeader();
+<a name="184" href="#184">184</a>         secHeader.insertSecurityHeader(doc);        
+<a name="185" href="#185">185</a>         log.info(<span class="string">"Before Encryption AES 128/RSA-15...."</span>);
+<a name="186" href="#186">186</a>         encryptedDoc = builder.build(doc, crypto, secHeader);
+<a name="187" href="#187">187</a>         log.info(<span class="string">"After Encryption AES 128/RSA-15...."</span>);
+<a name="188" href="#188">188</a>         encryptedMsg = (Message) SOAPUtil.toSOAPMessage(encryptedDoc);
+<a name="189" href="#189">189</a>         <strong>if</strong> (log.isDebugEnabled()) {
+<a name="190" href="#190">190</a>             log.debug(<span class="string">"Encrypted message, RSA-15 keytransport, AES 128:"</span>);
+<a name="191" href="#191">191</a>             XMLUtils.PrettyElementToWriter(encryptedMsg.getSOAPEnvelope().getAsDOM(), <strong>new</strong> PrintWriter(System.out));
+<a name="192" href="#192">192</a>         }
+<a name="193" href="#193">193</a>         encryptedString = encryptedMsg.getSOAPPartAsString();
+<a name="194" href="#194">194</a>         assertTrue(encryptedString.indexOf(<span class="string">"LogTestService2"</span>) == -1 ? <strong>true</strong> : false);
+<a name="195" href="#195">195</a>         encryptedDoc = encryptedMsg.getSOAPEnvelope().getAsDocument();
+<a name="196" href="#196">196</a>         verify(encryptedDoc);
+<a name="197" href="#197">197</a>     }
+<a name="198" href="#198">198</a> 
+<a name="199" href="#199">199</a>     <em>/**<em>*</em></em>
+<a name="200" href="#200">200</a> <em>     * Test that encrypt and decrypt a WS-Security envelope.</em>
+<a name="201" href="#201">201</a> <em>     * This test uses the RSA OAEP alogrithm to transport (wrap) the symmetric</em>
+<a name="202" href="#202">202</a> <em>     * key.</em>
+<a name="203" href="#203">203</a> <em>     * &lt;p/></em>
+<a name="204" href="#204">204</a> <em>     * </em>
+<a name="205" href="#205">205</a> <em>     * @throws Exception Thrown when there is any problem in signing or verification</em>
+<a name="206" href="#206">206</a> <em>     */</em>
+<a name="207" href="#207">207</a>      <strong>public</strong> <strong>void</strong> testEncryptionDecryptionOAEP() throws Exception {
+<a name="208" href="#208">208</a>         SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
+<a name="209" href="#209">209</a>         SOAPEnvelope envelope = <strong>null</strong>;
+<a name="210" href="#210">210</a>         WSSecEncrypt builder = <strong>new</strong> WSSecEncrypt();
+<a name="211" href="#211">211</a>         builder.setUserInfo(<span class="string">"wss4jcert"</span>);
+<a name="212" href="#212">212</a>         builder.setKeyIdentifierType(WSConstants.X509_KEY_IDENTIFIER);
+<a name="213" href="#213">213</a>         builder.setKeyEnc(WSConstants.KEYTRANSPORT_RSAOEP);
+<a name="214" href="#214">214</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="215" href="#215">215</a>         WSSecHeader secHeader = <strong>new</strong> WSSecHeader();
+<a name="216" href="#216">216</a>         secHeader.insertSecurityHeader(doc);        
+<a name="217" href="#217">217</a>         log.info(<span class="string">"Before Encryption Triple DES/RSA-OAEP...."</span>);
+<a name="218" href="#218">218</a>         Document encryptedDoc = builder.build(doc, crypto, secHeader);
+<a name="219" href="#219">219</a>         log.info(<span class="string">"After Encryption Triple DES/RSA-OAEP...."</span>);
+<a name="220" href="#220">220</a> 
+<a name="221" href="#221">221</a>         Message encryptedMsg = (Message) SOAPUtil.toSOAPMessage(encryptedDoc);
+<a name="222" href="#222">222</a>         <strong>if</strong> (log.isDebugEnabled()) {
+<a name="223" href="#223">223</a>             log.debug(<span class="string">"Encrypted message, RSA-OAEP keytransport, 3DES:"</span>);
+<a name="224" href="#224">224</a>             XMLUtils.PrettyElementToWriter(encryptedMsg.getSOAPEnvelope().getAsDOM(), <strong>new</strong> PrintWriter(System.out));
+<a name="225" href="#225">225</a>         }
+<a name="226" href="#226">226</a>         String encryptedString = encryptedMsg.getSOAPPartAsString();
+<a name="227" href="#227">227</a>         assertTrue(encryptedString.indexOf(<span class="string">"LogTestService2"</span>) == -1 ? <strong>true</strong> : false);
+<a name="228" href="#228">228</a>         encryptedDoc = encryptedMsg.getSOAPEnvelope().getAsDocument();
+<a name="229" href="#229">229</a>         verify(encryptedDoc);
+<a name="230" href="#230">230</a> 
+<a name="231" href="#231">231</a>     }
+<a name="232" href="#232">232</a>     
+<a name="233" href="#233">233</a>     <em>/**<em>*</em></em>
+<a name="234" href="#234">234</a> <em>     * Verifies the soap envelope</em>
+<a name="235" href="#235">235</a> <em>     * &lt;p/></em>
+<a name="236" href="#236">236</a> <em>     * </em>
+<a name="237" href="#237">237</a> <em>     * @param envelope </em>
+<a name="238" href="#238">238</a> <em>     * @throws Exception Thrown when there is a problem in verification</em>
+<a name="239" href="#239">239</a> <em>     */</em>
+<a name="240" href="#240">240</a>     <strong>private</strong> <strong>void</strong> verify(Document doc) throws Exception {
+<a name="241" href="#241">241</a>         secEngine.processSecurityHeader(doc, <strong>null</strong>, <strong>this</strong>, crypto);
+<a name="242" href="#242">242</a>         SOAPUtil.updateSOAPMessage(doc, message);
+<a name="243" href="#243">243</a>         String decryptedString = message.getSOAPPartAsString();
+<a name="244" href="#244">244</a>         assertTrue(decryptedString.indexOf(<span class="string">"LogTestService2"</span>) > 0 ? <strong>true</strong> : false);
+<a name="245" href="#245">245</a>     }
+<a name="246" href="#246">246</a> 
+<a name="247" href="#247">247</a>     <strong>public</strong> <strong>void</strong> handle(Callback[] callbacks)
+<a name="248" href="#248">248</a>             throws IOException, UnsupportedCallbackException {
+<a name="249" href="#249">249</a>         <strong>for</strong> (<strong>int</strong> i = 0; i &lt; callbacks.length; i++) {
+<a name="250" href="#250">250</a>             <strong>if</strong> (callbacks[i] instanceof WSPasswordCallback) {
+<a name="251" href="#251">251</a>                 WSPasswordCallback pc = (WSPasswordCallback) callbacks[i];
+<a name="252" href="#252">252</a>                 <em class="comment">/*</em>
+<a name="253" href="#253">253</a> <em class="comment">                 * here call a function/method to lookup the password for</em>
+<a name="254" href="#254">254</a> <em class="comment">                 * the given identifier (e.g. a user name or keystore alias)</em>
+<a name="255" href="#255">255</a> <em class="comment">                 * e.g.: pc.setPassword(passStore.getPassword(pc.getIdentfifier))</em>
+<a name="256" href="#256">256</a> <em class="comment">                 * for Testing we supply a fixed name here.</em>
+<a name="257" href="#257">257</a> <em class="comment">                 */</em>
+<a name="258" href="#258">258</a>                 pc.setPassword(<span class="string">"security"</span>);
+<a name="259" href="#259">259</a>             } <strong>else</strong> {
+<a name="260" href="#260">260</a>                 <strong>throw</strong> <strong>new</strong> UnsupportedCallbackException(callbacks[i], <span class="string">"Unrecognized Callback"</span>);
+<a name="261" href="#261">261</a>             }
+<a name="262" href="#262">262</a>         }
+<a name="263" href="#263">263</a>     }
+<a name="264" href="#264">264</a> }
+</pre>
+<hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
+</html>
+



---------------------------------------------------------------------
To unsubscribe, e-mail: wss4j-dev-unsubscribe@ws.apache.org
For additional commands, e-mail: wss4j-dev-help@ws.apache.org