You are viewing a plain text version of this content. The canonical link for it is here.
Posted to wss4j-dev@ws.apache.org by co...@apache.org on 2009/07/28 15:24:03 UTC

svn commit: r798514 [20/44] - in /webservices/wss4j/site: ./ apidocs/ apidocs/org/apache/ws/axis/security/ apidocs/org/apache/ws/axis/security/class-use/ apidocs/org/apache/ws/axis/security/handler/ apidocs/org/apache/ws/axis/security/handler/class-use...

Modified: webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew17.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew17.html?rev=798514&r1=798513&r2=798514&view=diff
==============================================================================
--- webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew17.html (original)
+++ webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew17.html Tue Jul 28 13:23:48 2009
@@ -31,189 +31,262 @@
 <a name="21" href="#21">21</a>  <strong class="jxr_keyword">import</strong> java.io.IOException;
 <a name="22" href="#22">22</a>  <strong class="jxr_keyword">import</strong> java.io.InputStream;
 <a name="23" href="#23">23</a>  
-<a name="24" href="#24">24</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.Callback;
-<a name="25" href="#25">25</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.CallbackHandler;
-<a name="26" href="#26">26</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.UnsupportedCallbackException;
-<a name="27" href="#27">27</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.SignatureMethod;
-<a name="28" href="#28">28</a>  
-<a name="29" href="#29">29</a>  <strong class="jxr_keyword">import</strong> junit.framework.Test;
-<a name="30" href="#30">30</a>  <strong class="jxr_keyword">import</strong> junit.framework.TestCase;
-<a name="31" href="#31">31</a>  <strong class="jxr_keyword">import</strong> junit.framework.TestSuite;
-<a name="32" href="#32">32</a>  
-<a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.Message;
-<a name="34" href="#34">34</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.MessageContext;
-<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.client.AxisClient;
-<a name="36" href="#36">36</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.configuration.NullProvider;
-<a name="37" href="#37">37</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.message.SOAPEnvelope;
-<a name="38" href="#38">38</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.logging.Log;
-<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.logging.LogFactory;
-<a name="40" href="#40">40</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSConstants;
-<a name="41" href="#41">41</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSPasswordCallback;
-<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityEngine;
-<a name="43" href="#43">43</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.components.crypto.Crypto;
-<a name="44" href="#44">44</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.components.crypto.CryptoFactory;
-<a name="45" href="#45">45</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecEncrypt;
-<a name="46" href="#46">46</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecEncryptedKey;
-<a name="47" href="#47">47</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecHeader;
-<a name="48" href="#48">48</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecSignature;
-<a name="49" href="#49">49</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Document;
-<a name="50" href="#50">50</a>  
-<a name="51" href="#51">51</a>  
-<a name="52" href="#52">52</a>  <em class="jxr_javadoccomment">/**</em>
-<a name="53" href="#53">53</a>  <em class="jxr_javadoccomment"> * Test symmetric key signature created using an encrypted key</em>
-<a name="54" href="#54">54</a>  <em class="jxr_javadoccomment"> * Demonstrates that Signature Crypto object can have null values when </em>
-<a name="55" href="#55">55</a>  <em class="jxr_javadoccomment"> * calling processSecurityHeader method of WSSecurityEngine.</em>
-<a name="56" href="#56">56</a>  <em class="jxr_javadoccomment"> */</em>
-<a name="57" href="#57">57</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> TestWSSecurityNew17 <strong class="jxr_keyword">extends</strong> TestCase implements CallbackHandler {
-<a name="58" href="#58">58</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> Log LOG = LogFactory.getLog(TestWSSecurityNew17.<strong class="jxr_keyword">class</strong>);
-<a name="59" href="#59">59</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> String SOAPMSG = 
-<a name="60" href="#60">60</a>          <span class="jxr_string">"&lt;?xml version=\&quot;1.0\&quot; encoding=\&quot;UTF-8\&quot;?&gt;"</span> 
-<a name="61" href="#61">61</a>          + <span class="jxr_string">"&lt;SOAP-ENV:Envelope "</span>
-<a name="62" href="#62">62</a>          +   <span class="jxr_string">"xmlns:SOAP-ENV=\&quot;http://schemas.xmlsoap.org/soap/envelope/\&quot; "</span>
-<a name="63" href="#63">63</a>          +   <span class="jxr_string">"xmlns:xsd=\&quot;http://www.w3.org/2001/XMLSchema\&quot; "</span>
-<a name="64" href="#64">64</a>          +   <span class="jxr_string">"xmlns:xsi=\&quot;http://www.w3.org/2001/XMLSchema-instance\&quot;&gt;"</span> 
-<a name="65" href="#65">65</a>          +   <span class="jxr_string">"&lt;SOAP-ENV:Body&gt;"</span> 
-<a name="66" href="#66">66</a>          +       <span class="jxr_string">"&lt;add xmlns=\&quot;http://ws.apache.org/counter/counter_port_type\&quot;&gt;"</span> 
-<a name="67" href="#67">67</a>          +           <span class="jxr_string">"&lt;value xmlns=\&quot;\&quot;&gt;15&lt;/value&gt;"</span> 
-<a name="68" href="#68">68</a>          +       <span class="jxr_string">"&lt;/add&gt;"</span> 
-<a name="69" href="#69">69</a>          +   <span class="jxr_string">"&lt;/SOAP-ENV:Body&gt;"</span> 
-<a name="70" href="#70">70</a>          + <span class="jxr_string">"&lt;/SOAP-ENV:Envelope&gt;"</span>;
-<a name="71" href="#71">71</a>  
-<a name="72" href="#72">72</a>      <strong class="jxr_keyword">private</strong> WSSecurityEngine secEngine = <strong class="jxr_keyword">new</strong> WSSecurityEngine();
-<a name="73" href="#73">73</a>      <strong class="jxr_keyword">private</strong> Crypto crypto = CryptoFactory.getInstance();
-<a name="74" href="#74">74</a>      <strong class="jxr_keyword">private</strong> MessageContext msgContext;
-<a name="75" href="#75">75</a>      <strong class="jxr_keyword">private</strong> Message message;
-<a name="76" href="#76">76</a>  
-<a name="77" href="#77">77</a>      <em class="jxr_javadoccomment">/**</em>
-<a name="78" href="#78">78</a>  <em class="jxr_javadoccomment">     * TestWSSecurity constructor</em>
-<a name="79" href="#79">79</a>  <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a name="80" href="#80">80</a>  <em class="jxr_javadoccomment">     * </em>
-<a name="81" href="#81">81</a>  <em class="jxr_javadoccomment">     * @param name name of the test</em>
-<a name="82" href="#82">82</a>  <em class="jxr_javadoccomment">     */</em>
-<a name="83" href="#83">83</a>      <strong class="jxr_keyword">public</strong> TestWSSecurityNew17(String name) {
-<a name="84" href="#84">84</a>          <strong class="jxr_keyword">super</strong>(name);
-<a name="85" href="#85">85</a>      }
-<a name="86" href="#86">86</a>  
-<a name="87" href="#87">87</a>      <em class="jxr_javadoccomment">/**</em>
-<a name="88" href="#88">88</a>  <em class="jxr_javadoccomment">     * JUnit suite</em>
-<a name="89" href="#89">89</a>  <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a name="90" href="#90">90</a>  <em class="jxr_javadoccomment">     * </em>
-<a name="91" href="#91">91</a>  <em class="jxr_javadoccomment">     * @return a junit test suite</em>
-<a name="92" href="#92">92</a>  <em class="jxr_javadoccomment">     */</em>
-<a name="93" href="#93">93</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> Test suite() {
-<a name="94" href="#94">94</a>          <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> TestSuite(TestWSSecurityNew17.<strong class="jxr_keyword">class</strong>);
-<a name="95" href="#95">95</a>      }
-<a name="96" href="#96">96</a>  
-<a name="97" href="#97">97</a>      <em class="jxr_javadoccomment">/**</em>
-<a name="98" href="#98">98</a>  <em class="jxr_javadoccomment">     * Setup method</em>
-<a name="99" href="#99">99</a>  <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a name="100" href="#100">100</a> <em class="jxr_javadoccomment">     * </em>
-<a name="101" href="#101">101</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is a problem in setup</em>
-<a name="102" href="#102">102</a> <em class="jxr_javadoccomment">     */</em>
-<a name="103" href="#103">103</a>     <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">void</strong> setUp() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="104" href="#104">104</a>         AxisClient tmpEngine = <strong class="jxr_keyword">new</strong> AxisClient(<strong class="jxr_keyword">new</strong> NullProvider());
-<a name="105" href="#105">105</a>         msgContext = <strong class="jxr_keyword">new</strong> MessageContext(tmpEngine);
-<a name="106" href="#106">106</a>         message = getSOAPMessage();
-<a name="107" href="#107">107</a>     }
-<a name="108" href="#108">108</a> 
-<a name="109" href="#109">109</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="110" href="#110">110</a> <em class="jxr_javadoccomment">     * Constructs a soap envelope</em>
-<a name="111" href="#111">111</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a name="112" href="#112">112</a> <em class="jxr_javadoccomment">     * </em>
-<a name="113" href="#113">113</a> <em class="jxr_javadoccomment">     * @return soap envelope</em>
-<a name="114" href="#114">114</a> <em class="jxr_javadoccomment">     * @throws Exception if there is any problem constructing the soap envelope</em>
-<a name="115" href="#115">115</a> <em class="jxr_javadoccomment">     */</em>
-<a name="116" href="#116">116</a>     <strong class="jxr_keyword">protected</strong> Message getSOAPMessage() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="117" href="#117">117</a>         InputStream in = <strong class="jxr_keyword">new</strong> ByteArrayInputStream(SOAPMSG.getBytes());
-<a name="118" href="#118">118</a>         Message msg = <strong class="jxr_keyword">new</strong> Message(in);
-<a name="119" href="#119">119</a>         msg.setMessageContext(msgContext);
-<a name="120" href="#120">120</a>         <strong class="jxr_keyword">return</strong> msg;
-<a name="121" href="#121">121</a>     }
-<a name="122" href="#122">122</a> 
-<a name="123" href="#123">123</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="124" href="#124">124</a> <em class="jxr_javadoccomment">     * Test that first signs, then encrypts a WS-Security envelope.</em>
-<a name="125" href="#125">125</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a name="126" href="#126">126</a> <em class="jxr_javadoccomment">     * </em>
-<a name="127" href="#127">127</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is any problem in signing, encryption,</em>
-<a name="128" href="#128">128</a> <em class="jxr_javadoccomment">     *                   decryption, or verification</em>
-<a name="129" href="#129">129</a> <em class="jxr_javadoccomment">     */</em>
-<a name="130" href="#130">130</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptedKeySignature() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="131" href="#131">131</a>         
-<a name="132" href="#132">132</a>         SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
-<a name="133" href="#133">133</a>         LOG.info(<span class="jxr_string">"Before Sign/Encryption...."</span>);
-<a name="134" href="#134">134</a>         Document doc = unsignedEnvelope.getAsDocument();
-<a name="135" href="#135">135</a>         
-<a name="136" href="#136">136</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
-<a name="137" href="#137">137</a>         secHeader.insertSecurityHeader(doc);
-<a name="138" href="#138">138</a>         
-<a name="139" href="#139">139</a>         WSSecEncryptedKey encrKey = <strong class="jxr_keyword">new</strong> WSSecEncryptedKey();
-<a name="140" href="#140">140</a>         encrKey.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
-<a name="141" href="#141">141</a>         encrKey.setUserInfo(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>, <span class="jxr_string">"security"</span>);
-<a name="142" href="#142">142</a>         encrKey.setKeySize(192);
-<a name="143" href="#143">143</a>         encrKey.prepare(doc, crypto);   
-<a name="144" href="#144">144</a>         
-<a name="145" href="#145">145</a>         WSSecEncrypt encrypt = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
-<a name="146" href="#146">146</a>         encrypt.setEncKeyId(encrKey.getId());
-<a name="147" href="#147">147</a>         encrypt.setEphemeralKey(encrKey.getEphemeralKey());
-<a name="148" href="#148">148</a>         encrypt.setSymmetricEncAlgorithm(WSConstants.TRIPLE_DES);
-<a name="149" href="#149">149</a>         encrypt.setEncryptSymmKey(false);
-<a name="150" href="#150">150</a>         encrypt.setEncryptedKeyElement(encrKey.getEncryptedKeyElement());
-<a name="151" href="#151">151</a> 
-<a name="152" href="#152">152</a>         WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature();
-<a name="153" href="#153">153</a>         sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
-<a name="154" href="#154">154</a>         sign.setCustomTokenId(encrKey.getId());
-<a name="155" href="#155">155</a>         sign.setSecretKey(encrKey.getEphemeralKey());
-<a name="156" href="#156">156</a>         sign.setSignatureAlgorithm(SignatureMethod.HMAC_SHA1);
-<a name="157" href="#157">157</a> 
-<a name="158" href="#158">158</a>         Document signedDoc = sign.build(doc, crypto, secHeader);
-<a name="159" href="#159">159</a>         Document encryptedSignedDoc = encrypt.build(signedDoc, crypto, secHeader);
-<a name="160" href="#160">160</a> 
-<a name="161" href="#161">161</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="162" href="#162">162</a>             LOG.debug(<span class="jxr_string">"Signed and encrypted message with IssuerSerial key identifier (both), 3DES:"</span>);
-<a name="163" href="#163">163</a>             String outputString = 
-<a name="164" href="#164">164</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedSignedDoc);
-<a name="165" href="#165">165</a>             LOG.debug(outputString);
-<a name="166" href="#166">166</a>         }
-<a name="167" href="#167">167</a>         
-<a name="168" href="#168">168</a>         LOG.info(<span class="jxr_string">"After Sign/Encryption...."</span>);
-<a name="169" href="#169">169</a>         verify(encryptedSignedDoc);
-<a name="170" href="#170">170</a>     }
-<a name="171" href="#171">171</a> 
-<a name="172" href="#172">172</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="173" href="#173">173</a> <em class="jxr_javadoccomment">     * Verifies the soap envelope</em>
-<a name="174" href="#174">174</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
-<a name="175" href="#175">175</a> <em class="jxr_javadoccomment">     * </em>
-<a name="176" href="#176">176</a> <em class="jxr_javadoccomment">     * @param doc </em>
-<a name="177" href="#177">177</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is a problem in verification</em>
-<a name="178" href="#178">178</a> <em class="jxr_javadoccomment">     */</em>
-<a name="179" href="#179">179</a>     <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">void</strong> verify(Document doc) <strong class="jxr_keyword">throws</strong> Exception {
-<a name="180" href="#180">180</a>         secEngine.processSecurityHeader(doc, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">this</strong>, <strong class="jxr_keyword">null</strong>, crypto);
-<a name="181" href="#181">181</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="182" href="#182">182</a>             LOG.debug(<span class="jxr_string">"Verfied and decrypted message:"</span>);
-<a name="183" href="#183">183</a>             String outputString = 
-<a name="184" href="#184">184</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
-<a name="185" href="#185">185</a>             LOG.debug(outputString);
-<a name="186" href="#186">186</a>         }
-<a name="187" href="#187">187</a>     }
-<a name="188" href="#188">188</a> 
-<a name="189" href="#189">189</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> handle(Callback[] callbacks)
-<a name="190" href="#190">190</a>         <strong class="jxr_keyword">throws</strong> IOException, UnsupportedCallbackException {
-<a name="191" href="#191">191</a>         <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> i = 0; i &lt; callbacks.length; i++) {
-<a name="192" href="#192">192</a>             <strong class="jxr_keyword">if</strong> (callbacks[i] instanceof WSPasswordCallback) {
-<a name="193" href="#193">193</a>                 WSPasswordCallback pc = (WSPasswordCallback) callbacks[i];
-<a name="194" href="#194">194</a>                 <em class="jxr_comment">/*</em>
-<a name="195" href="#195">195</a> <em class="jxr_comment">                 * here call a function/method to lookup the password for</em>
-<a name="196" href="#196">196</a> <em class="jxr_comment">                 * the given identifier (e.g. a user name or keystore alias)</em>
-<a name="197" href="#197">197</a> <em class="jxr_comment">                 * e.g.: pc.setPassword(passStore.getPassword(pc.getIdentfifier))</em>
-<a name="198" href="#198">198</a> <em class="jxr_comment">                 * for Testing we supply a fixed name here.</em>
-<a name="199" href="#199">199</a> <em class="jxr_comment">                 */</em>
-<a name="200" href="#200">200</a>                 pc.setPassword(<span class="jxr_string">"security"</span>);
-<a name="201" href="#201">201</a>             } <strong class="jxr_keyword">else</strong> {
-<a name="202" href="#202">202</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> UnsupportedCallbackException(callbacks[i], <span class="jxr_string">"Unrecognized Callback"</span>);
-<a name="203" href="#203">203</a>             }
-<a name="204" href="#204">204</a>         }
-<a name="205" href="#205">205</a>     }
-<a name="206" href="#206">206</a> }
+<a name="24" href="#24">24</a>  <strong class="jxr_keyword">import</strong> javax.crypto.KeyGenerator;
+<a name="25" href="#25">25</a>  <strong class="jxr_keyword">import</strong> javax.crypto.SecretKey;
+<a name="26" href="#26">26</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.Callback;
+<a name="27" href="#27">27</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.CallbackHandler;
+<a name="28" href="#28">28</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.UnsupportedCallbackException;
+<a name="29" href="#29">29</a>  <strong class="jxr_keyword">import</strong> javax.xml.crypto.dsig.SignatureMethod;
+<a name="30" href="#30">30</a>  
+<a name="31" href="#31">31</a>  <strong class="jxr_keyword">import</strong> junit.framework.Test;
+<a name="32" href="#32">32</a>  <strong class="jxr_keyword">import</strong> junit.framework.TestCase;
+<a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> junit.framework.TestSuite;
+<a name="34" href="#34">34</a>  
+<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.Message;
+<a name="36" href="#36">36</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.MessageContext;
+<a name="37" href="#37">37</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.client.AxisClient;
+<a name="38" href="#38">38</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.configuration.NullProvider;
+<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.message.SOAPEnvelope;
+<a name="40" href="#40">40</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.logging.Log;
+<a name="41" href="#41">41</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.logging.LogFactory;
+<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSConstants;
+<a name="43" href="#43">43</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSPasswordCallback;
+<a name="44" href="#44">44</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityEngine;
+<a name="45" href="#45">45</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.components.crypto.Crypto;
+<a name="46" href="#46">46</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.components.crypto.CryptoFactory;
+<a name="47" href="#47">47</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecEncrypt;
+<a name="48" href="#48">48</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecEncryptedKey;
+<a name="49" href="#49">49</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecHeader;
+<a name="50" href="#50">50</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecSignature;
+<a name="51" href="#51">51</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Document;
+<a name="52" href="#52">52</a>  
+<a name="53" href="#53">53</a>  
+<a name="54" href="#54">54</a>  <em class="jxr_javadoccomment">/**</em>
+<a name="55" href="#55">55</a>  <em class="jxr_javadoccomment"> * Test symmetric key signature created using an encrypted key</em>
+<a name="56" href="#56">56</a>  <em class="jxr_javadoccomment"> * Demonstrates that Signature Crypto object can have null values when </em>
+<a name="57" href="#57">57</a>  <em class="jxr_javadoccomment"> * calling processSecurityHeader method of WSSecurityEngine.</em>
+<a name="58" href="#58">58</a>  <em class="jxr_javadoccomment"> */</em>
+<a name="59" href="#59">59</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> TestWSSecurityNew17 <strong class="jxr_keyword">extends</strong> TestCase implements CallbackHandler {
+<a name="60" href="#60">60</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> Log LOG = LogFactory.getLog(TestWSSecurityNew17.<strong class="jxr_keyword">class</strong>);
+<a name="61" href="#61">61</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> String SOAPMSG = 
+<a name="62" href="#62">62</a>          <span class="jxr_string">"&lt;?xml version=\&quot;1.0\&quot; encoding=\&quot;UTF-8\&quot;?&gt;"</span> 
+<a name="63" href="#63">63</a>          + <span class="jxr_string">"&lt;SOAP-ENV:Envelope "</span>
+<a name="64" href="#64">64</a>          +   <span class="jxr_string">"xmlns:SOAP-ENV=\&quot;http://schemas.xmlsoap.org/soap/envelope/\&quot; "</span>
+<a name="65" href="#65">65</a>          +   <span class="jxr_string">"xmlns:xsd=\&quot;http://www.w3.org/2001/XMLSchema\&quot; "</span>
+<a name="66" href="#66">66</a>          +   <span class="jxr_string">"xmlns:xsi=\&quot;http://www.w3.org/2001/XMLSchema-instance\&quot;&gt;"</span> 
+<a name="67" href="#67">67</a>          +   <span class="jxr_string">"&lt;SOAP-ENV:Body&gt;"</span> 
+<a name="68" href="#68">68</a>          +       <span class="jxr_string">"&lt;add xmlns=\&quot;http://ws.apache.org/counter/counter_port_type\&quot;&gt;"</span> 
+<a name="69" href="#69">69</a>          +           <span class="jxr_string">"&lt;value xmlns=\&quot;\&quot;&gt;15&lt;/value&gt;"</span> 
+<a name="70" href="#70">70</a>          +       <span class="jxr_string">"&lt;/add&gt;"</span> 
+<a name="71" href="#71">71</a>          +   <span class="jxr_string">"&lt;/SOAP-ENV:Body&gt;"</span> 
+<a name="72" href="#72">72</a>          + <span class="jxr_string">"&lt;/SOAP-ENV:Envelope&gt;"</span>;
+<a name="73" href="#73">73</a>  
+<a name="74" href="#74">74</a>      <strong class="jxr_keyword">private</strong> WSSecurityEngine secEngine = <strong class="jxr_keyword">new</strong> WSSecurityEngine();
+<a name="75" href="#75">75</a>      <strong class="jxr_keyword">private</strong> Crypto crypto = CryptoFactory.getInstance();
+<a name="76" href="#76">76</a>      <strong class="jxr_keyword">private</strong> MessageContext msgContext;
+<a name="77" href="#77">77</a>      <strong class="jxr_keyword">private</strong> Message message;
+<a name="78" href="#78">78</a>      <strong class="jxr_keyword">private</strong> byte[] keyData;
+<a name="79" href="#79">79</a>  
+<a name="80" href="#80">80</a>      <em class="jxr_javadoccomment">/**</em>
+<a name="81" href="#81">81</a>  <em class="jxr_javadoccomment">     * TestWSSecurity constructor</em>
+<a name="82" href="#82">82</a>  <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="83" href="#83">83</a>  <em class="jxr_javadoccomment">     * </em>
+<a name="84" href="#84">84</a>  <em class="jxr_javadoccomment">     * @param name name of the test</em>
+<a name="85" href="#85">85</a>  <em class="jxr_javadoccomment">     */</em>
+<a name="86" href="#86">86</a>      <strong class="jxr_keyword">public</strong> TestWSSecurityNew17(String name) {
+<a name="87" href="#87">87</a>          <strong class="jxr_keyword">super</strong>(name);
+<a name="88" href="#88">88</a>      }
+<a name="89" href="#89">89</a>  
+<a name="90" href="#90">90</a>      <em class="jxr_javadoccomment">/**</em>
+<a name="91" href="#91">91</a>  <em class="jxr_javadoccomment">     * JUnit suite</em>
+<a name="92" href="#92">92</a>  <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="93" href="#93">93</a>  <em class="jxr_javadoccomment">     * </em>
+<a name="94" href="#94">94</a>  <em class="jxr_javadoccomment">     * @return a junit test suite</em>
+<a name="95" href="#95">95</a>  <em class="jxr_javadoccomment">     */</em>
+<a name="96" href="#96">96</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> Test suite() {
+<a name="97" href="#97">97</a>          <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> TestSuite(TestWSSecurityNew17.<strong class="jxr_keyword">class</strong>);
+<a name="98" href="#98">98</a>      }
+<a name="99" href="#99">99</a>  
+<a name="100" href="#100">100</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="101" href="#101">101</a> <em class="jxr_javadoccomment">     * Setup method</em>
+<a name="102" href="#102">102</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="103" href="#103">103</a> <em class="jxr_javadoccomment">     * </em>
+<a name="104" href="#104">104</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is a problem in setup</em>
+<a name="105" href="#105">105</a> <em class="jxr_javadoccomment">     */</em>
+<a name="106" href="#106">106</a>     <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">void</strong> setUp() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="107" href="#107">107</a>         AxisClient tmpEngine = <strong class="jxr_keyword">new</strong> AxisClient(<strong class="jxr_keyword">new</strong> NullProvider());
+<a name="108" href="#108">108</a>         msgContext = <strong class="jxr_keyword">new</strong> MessageContext(tmpEngine);
+<a name="109" href="#109">109</a>         message = getSOAPMessage();
+<a name="110" href="#110">110</a>         
+<a name="111" href="#111">111</a>         KeyGenerator keyGen = KeyGenerator.getInstance(<span class="jxr_string">"AES"</span>);
+<a name="112" href="#112">112</a>         keyGen.init(128);
+<a name="113" href="#113">113</a>         SecretKey key = keyGen.generateKey();
+<a name="114" href="#114">114</a>         keyData = key.getEncoded();
+<a name="115" href="#115">115</a>     }
+<a name="116" href="#116">116</a> 
+<a name="117" href="#117">117</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="118" href="#118">118</a> <em class="jxr_javadoccomment">     * Constructs a soap envelope</em>
+<a name="119" href="#119">119</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="120" href="#120">120</a> <em class="jxr_javadoccomment">     * </em>
+<a name="121" href="#121">121</a> <em class="jxr_javadoccomment">     * @return soap envelope</em>
+<a name="122" href="#122">122</a> <em class="jxr_javadoccomment">     * @throws Exception if there is any problem constructing the soap envelope</em>
+<a name="123" href="#123">123</a> <em class="jxr_javadoccomment">     */</em>
+<a name="124" href="#124">124</a>     <strong class="jxr_keyword">protected</strong> Message getSOAPMessage() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="125" href="#125">125</a>         InputStream in = <strong class="jxr_keyword">new</strong> ByteArrayInputStream(SOAPMSG.getBytes());
+<a name="126" href="#126">126</a>         Message msg = <strong class="jxr_keyword">new</strong> Message(in);
+<a name="127" href="#127">127</a>         msg.setMessageContext(msgContext);
+<a name="128" href="#128">128</a>         <strong class="jxr_keyword">return</strong> msg;
+<a name="129" href="#129">129</a>     }
+<a name="130" href="#130">130</a>     
+<a name="131" href="#131">131</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="132" href="#132">132</a> <em class="jxr_javadoccomment">     * Test signing a message body using a symmetric key with EncryptedKeySHA1</em>
+<a name="133" href="#133">133</a> <em class="jxr_javadoccomment">     */</em>
+<a name="134" href="#134">134</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSymmetricSignatureSHA1() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="135" href="#135">135</a>         SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
+<a name="136" href="#136">136</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="137" href="#137">137</a>         
+<a name="138" href="#138">138</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="139" href="#139">139</a>         secHeader.insertSecurityHeader(doc);
+<a name="140" href="#140">140</a>         
+<a name="141" href="#141">141</a>         WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature();
+<a name="142" href="#142">142</a>         sign.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER);
+<a name="143" href="#143">143</a>         sign.setSecretKey(keyData);
+<a name="144" href="#144">144</a>         sign.setSignatureAlgorithm(SignatureMethod.HMAC_SHA1);
+<a name="145" href="#145">145</a> 
+<a name="146" href="#146">146</a>         Document signedDoc = sign.build(doc, crypto, secHeader);
+<a name="147" href="#147">147</a>         
+<a name="148" href="#148">148</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="149" href="#149">149</a>             LOG.debug(<span class="jxr_string">"Signed symmetric message SHA1:"</span>);
+<a name="150" href="#150">150</a>             String outputString = 
+<a name="151" href="#151">151</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
+<a name="152" href="#152">152</a>             LOG.debug(outputString);
+<a name="153" href="#153">153</a>         }
+<a name="154" href="#154">154</a>         
+<a name="155" href="#155">155</a>         verify(signedDoc);
+<a name="156" href="#156">156</a>     }
+<a name="157" href="#157">157</a>     
+<a name="158" href="#158">158</a>     
+<a name="159" href="#159">159</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="160" href="#160">160</a> <em class="jxr_javadoccomment">     * Test signing a message body using a symmetric key with Direct Reference to an</em>
+<a name="161" href="#161">161</a> <em class="jxr_javadoccomment">     * EncryptedKey</em>
+<a name="162" href="#162">162</a> <em class="jxr_javadoccomment">     */</em>
+<a name="163" href="#163">163</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSymmetricSignatureDR() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="164" href="#164">164</a>         SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
+<a name="165" href="#165">165</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="166" href="#166">166</a>         
+<a name="167" href="#167">167</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="168" href="#168">168</a>         secHeader.insertSecurityHeader(doc);
+<a name="169" href="#169">169</a>         
+<a name="170" href="#170">170</a>         WSSecEncryptedKey encrKey = <strong class="jxr_keyword">new</strong> WSSecEncryptedKey();
+<a name="171" href="#171">171</a>         encrKey.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
+<a name="172" href="#172">172</a>         encrKey.setUserInfo(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>, <span class="jxr_string">"security"</span>);
+<a name="173" href="#173">173</a>         encrKey.setKeySize(192);
+<a name="174" href="#174">174</a>         encrKey.prepare(doc, crypto);
+<a name="175" href="#175">175</a>         
+<a name="176" href="#176">176</a>         WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature();
+<a name="177" href="#177">177</a>         sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
+<a name="178" href="#178">178</a>         sign.setCustomTokenId(encrKey.getId());
+<a name="179" href="#179">179</a>         sign.setSecretKey(encrKey.getEphemeralKey());
+<a name="180" href="#180">180</a>         sign.setSignatureAlgorithm(SignatureMethod.HMAC_SHA1);
+<a name="181" href="#181">181</a>         sign.setCustomTokenValueType(
+<a name="182" href="#182">182</a>             WSConstants.SOAPMESSAGE_NS11 + <span class="jxr_string">"#"</span> + WSConstants.ENC_KEY_VALUE_TYPE
+<a name="183" href="#183">183</a>         );
+<a name="184" href="#184">184</a> 
+<a name="185" href="#185">185</a>         Document signedDoc = sign.build(doc, crypto, secHeader);
+<a name="186" href="#186">186</a>         
+<a name="187" href="#187">187</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="188" href="#188">188</a>             LOG.debug(<span class="jxr_string">"Signed symmetric message DR:"</span>);
+<a name="189" href="#189">189</a>             String outputString = 
+<a name="190" href="#190">190</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
+<a name="191" href="#191">191</a>             LOG.debug(outputString);
+<a name="192" href="#192">192</a>         }
+<a name="193" href="#193">193</a>     }
+<a name="194" href="#194">194</a> 
+<a name="195" href="#195">195</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="196" href="#196">196</a> <em class="jxr_javadoccomment">     * Test that first signs, then encrypts a WS-Security envelope.</em>
+<a name="197" href="#197">197</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="198" href="#198">198</a> <em class="jxr_javadoccomment">     * </em>
+<a name="199" href="#199">199</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is any problem in signing, encryption,</em>
+<a name="200" href="#200">200</a> <em class="jxr_javadoccomment">     *                   decryption, or verification</em>
+<a name="201" href="#201">201</a> <em class="jxr_javadoccomment">     */</em>
+<a name="202" href="#202">202</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testEncryptedKeySignature() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="203" href="#203">203</a>         
+<a name="204" href="#204">204</a>         SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
+<a name="205" href="#205">205</a>         LOG.info(<span class="jxr_string">"Before Sign/Encryption...."</span>);
+<a name="206" href="#206">206</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="207" href="#207">207</a>         
+<a name="208" href="#208">208</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="209" href="#209">209</a>         secHeader.insertSecurityHeader(doc);
+<a name="210" href="#210">210</a>         
+<a name="211" href="#211">211</a>         WSSecEncryptedKey encrKey = <strong class="jxr_keyword">new</strong> WSSecEncryptedKey();
+<a name="212" href="#212">212</a>         encrKey.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
+<a name="213" href="#213">213</a>         encrKey.setUserInfo(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>, <span class="jxr_string">"security"</span>);
+<a name="214" href="#214">214</a>         encrKey.setKeySize(192);
+<a name="215" href="#215">215</a>         encrKey.prepare(doc, crypto);   
+<a name="216" href="#216">216</a>         
+<a name="217" href="#217">217</a>         WSSecEncrypt encrypt = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
+<a name="218" href="#218">218</a>         encrypt.setEncKeyId(encrKey.getId());
+<a name="219" href="#219">219</a>         encrypt.setEphemeralKey(encrKey.getEphemeralKey());
+<a name="220" href="#220">220</a>         encrypt.setSymmetricEncAlgorithm(WSConstants.TRIPLE_DES);
+<a name="221" href="#221">221</a>         encrypt.setEncryptSymmKey(false);
+<a name="222" href="#222">222</a>         encrypt.setEncryptedKeyElement(encrKey.getEncryptedKeyElement());
+<a name="223" href="#223">223</a> 
+<a name="224" href="#224">224</a>         WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature();
+<a name="225" href="#225">225</a>         sign.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING);
+<a name="226" href="#226">226</a>         sign.setCustomTokenId(encrKey.getId());
+<a name="227" href="#227">227</a>         sign.setSecretKey(encrKey.getEphemeralKey());
+<a name="228" href="#228">228</a>         sign.setSignatureAlgorithm(SignatureMethod.HMAC_SHA1);
+<a name="229" href="#229">229</a> 
+<a name="230" href="#230">230</a>         Document signedDoc = sign.build(doc, crypto, secHeader);
+<a name="231" href="#231">231</a>         Document encryptedSignedDoc = encrypt.build(signedDoc, crypto, secHeader);
+<a name="232" href="#232">232</a> 
+<a name="233" href="#233">233</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="234" href="#234">234</a>             LOG.debug(<span class="jxr_string">"Signed and encrypted message with IssuerSerial key identifier (both), 3DES:"</span>);
+<a name="235" href="#235">235</a>             String outputString = 
+<a name="236" href="#236">236</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(encryptedSignedDoc);
+<a name="237" href="#237">237</a>             LOG.debug(outputString);
+<a name="238" href="#238">238</a>         }
+<a name="239" href="#239">239</a>         
+<a name="240" href="#240">240</a>         LOG.info(<span class="jxr_string">"After Sign/Encryption...."</span>);
+<a name="241" href="#241">241</a>         verify(encryptedSignedDoc);
+<a name="242" href="#242">242</a>     }
+<a name="243" href="#243">243</a> 
+<a name="244" href="#244">244</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="245" href="#245">245</a> <em class="jxr_javadoccomment">     * Verifies the soap envelope</em>
+<a name="246" href="#246">246</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="247" href="#247">247</a> <em class="jxr_javadoccomment">     * </em>
+<a name="248" href="#248">248</a> <em class="jxr_javadoccomment">     * @param doc </em>
+<a name="249" href="#249">249</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is a problem in verification</em>
+<a name="250" href="#250">250</a> <em class="jxr_javadoccomment">     */</em>
+<a name="251" href="#251">251</a>     <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">void</strong> verify(Document doc) <strong class="jxr_keyword">throws</strong> Exception {
+<a name="252" href="#252">252</a>         secEngine.processSecurityHeader(doc, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">this</strong>, <strong class="jxr_keyword">null</strong>, crypto);
+<a name="253" href="#253">253</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="254" href="#254">254</a>             LOG.debug(<span class="jxr_string">"Verfied and decrypted message:"</span>);
+<a name="255" href="#255">255</a>             String outputString = 
+<a name="256" href="#256">256</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
+<a name="257" href="#257">257</a>             LOG.debug(outputString);
+<a name="258" href="#258">258</a>         }
+<a name="259" href="#259">259</a>     }
+<a name="260" href="#260">260</a> 
+<a name="261" href="#261">261</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> handle(Callback[] callbacks)
+<a name="262" href="#262">262</a>         <strong class="jxr_keyword">throws</strong> IOException, UnsupportedCallbackException {
+<a name="263" href="#263">263</a>         <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> i = 0; i &lt; callbacks.length; i++) {
+<a name="264" href="#264">264</a>             <strong class="jxr_keyword">if</strong> (callbacks[i] instanceof WSPasswordCallback) {
+<a name="265" href="#265">265</a>                 WSPasswordCallback pc = (WSPasswordCallback) callbacks[i];
+<a name="266" href="#266">266</a>                 <em class="jxr_comment">/*</em>
+<a name="267" href="#267">267</a> <em class="jxr_comment">                 * here call a function/method to lookup the password for</em>
+<a name="268" href="#268">268</a> <em class="jxr_comment">                 * the given identifier (e.g. a user name or keystore alias)</em>
+<a name="269" href="#269">269</a> <em class="jxr_comment">                 * e.g.: pc.setPassword(passStore.getPassword(pc.getIdentfifier))</em>
+<a name="270" href="#270">270</a> <em class="jxr_comment">                 * for Testing we supply a fixed name here.</em>
+<a name="271" href="#271">271</a> <em class="jxr_comment">                 */</em>
+<a name="272" href="#272">272</a>                 pc.setPassword(<span class="jxr_string">"security"</span>);
+<a name="273" href="#273">273</a>                 pc.setKey(keyData);
+<a name="274" href="#274">274</a>             } <strong class="jxr_keyword">else</strong> {
+<a name="275" href="#275">275</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> UnsupportedCallbackException(callbacks[i], <span class="jxr_string">"Unrecognized Callback"</span>);
+<a name="276" href="#276">276</a>             }
+<a name="277" href="#277">277</a>         }
+<a name="278" href="#278">278</a>     }
+<a name="279" href="#279">279</a> }
 </pre>
 <hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
 </html>

Modified: webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew18.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew18.html?rev=798514&r1=798513&r2=798514&view=diff
==============================================================================
--- webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew18.html (original)
+++ webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew18.html Tue Jul 28 13:23:48 2009
@@ -230,7 +230,7 @@
 <a name="220" href="#220">220</a>         <strong class="jxr_keyword">final</strong> java.util.Vector actions = <strong class="jxr_keyword">new</strong> java.util.Vector();
 <a name="221" href="#221">221</a>         actions.add(<strong class="jxr_keyword">new</strong> Integer(action));
 <a name="222" href="#222">222</a>         <strong class="jxr_keyword">final</strong> Document doc = unsignedEnvelope.getAsDocument();
-<a name="223" href="#223">223</a>         <a href="../wssec/TestWSSecurityGetPassword.html">MyHandler</a> handler = <strong class="jxr_keyword">new</strong> <a href="../wssec/TestWSSecurityGetPassword.html">MyHandler</a>();
+<a name="223" href="#223">223</a>         <a href="../wssec/TestWSSecurityResultsOrder.html">MyHandler</a> handler = <strong class="jxr_keyword">new</strong> <a href="../wssec/TestWSSecurityResultsOrder.html">MyHandler</a>();
 <a name="224" href="#224">224</a>         handler.doit(
 <a name="225" href="#225">225</a>             action, 
 <a name="226" href="#226">226</a>             doc, 
@@ -256,7 +256,7 @@
 <a name="246" href="#246">246</a>     <em class="jxr_javadoccomment">/**</em>
 <a name="247" href="#247">247</a> <em class="jxr_javadoccomment">     * a trivial extension of the WSHandler type</em>
 <a name="248" href="#248">248</a> <em class="jxr_javadoccomment">     */</em>
-<a name="249" href="#249">249</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">class</strong> <a href="../wssec/TestWSSecurityGetPassword.html">MyHandler</a> <strong class="jxr_keyword">extends</strong> WSHandler {
+<a name="249" href="#249">249</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">class</strong> <a href="../wssec/TestWSSecurityResultsOrder.html">MyHandler</a> <strong class="jxr_keyword">extends</strong> WSHandler {
 <a name="250" href="#250">250</a>         
 <a name="251" href="#251">251</a>         <strong class="jxr_keyword">public</strong> Object 
 <a name="252" href="#252">252</a>         getOption(String key) {

Modified: webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew2.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew2.html?rev=798514&r1=798513&r2=798514&view=diff
==============================================================================
--- webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew2.html (original)
+++ webservices/wss4j/site/xref-test/wssec/TestWSSecurityNew2.html Tue Jul 28 13:23:48 2009
@@ -243,57 +243,58 @@
 <a name="233" href="#233">233</a>         Document doc,
 <a name="234" href="#234">234</a>         javax.xml.namespace.QName expectedEncryptedElement
 <a name="235" href="#235">235</a>     ) <strong class="jxr_keyword">throws</strong> Exception {
-<a name="236" href="#236">236</a>         <strong class="jxr_keyword">final</strong> java.util.List results = secEngine.processSecurityHeader(doc, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">this</strong>, crypto);
-<a name="237" href="#237">237</a>         String outputString = 
-<a name="238" href="#238">238</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
-<a name="239" href="#239">239</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"LogTestService2"</span>) &gt; 0 ? <strong class="jxr_keyword">true</strong> : false);
-<a name="240" href="#240">240</a>         <em class="jxr_comment">//</em>
-<a name="241" href="#241">241</a>         <em class="jxr_comment">// walk through the results, and make sure there is an encryption</em>
-<a name="242" href="#242">242</a>         <em class="jxr_comment">// action, together with a reference to the decrypted element </em>
-<a name="243" href="#243">243</a>         <em class="jxr_comment">// (as a QName)</em>
-<a name="244" href="#244">244</a>         <em class="jxr_comment">//</em>
-<a name="245" href="#245">245</a>         <strong class="jxr_keyword">boolean</strong> encrypted = false;
-<a name="246" href="#246">246</a>         <strong class="jxr_keyword">for</strong> (java.util.Iterator ipos = results.iterator(); ipos.hasNext();) {
-<a name="247" href="#247">247</a>             <strong class="jxr_keyword">final</strong> java.util.Map result = (java.util.Map) ipos.next();
-<a name="248" href="#248">248</a>             <strong class="jxr_keyword">final</strong> Integer action = (Integer) result.get(WSSecurityEngineResult.TAG_ACTION);
-<a name="249" href="#249">249</a>             assertNotNull(action);
-<a name="250" href="#250">250</a>             <strong class="jxr_keyword">if</strong> ((action.intValue() &amp; WSConstants.ENCR) != 0) {
-<a name="251" href="#251">251</a>                 <strong class="jxr_keyword">final</strong> java.util.List refs =
-<a name="252" href="#252">252</a>                     (java.util.List) result.get(WSSecurityEngineResult.TAG_DATA_REF_URIS);
-<a name="253" href="#253">253</a>                 assertNotNull(refs);
-<a name="254" href="#254">254</a>                 encrypted = <strong class="jxr_keyword">true</strong>;
-<a name="255" href="#255">255</a>                 <strong class="jxr_keyword">for</strong> (java.util.Iterator jpos = refs.iterator(); jpos.hasNext();) {
-<a name="256" href="#256">256</a>                     <strong class="jxr_keyword">final</strong> WSDataRef ref = (WSDataRef) jpos.next();
-<a name="257" href="#257">257</a>                     assertNotNull(ref);
-<a name="258" href="#258">258</a>                     assertNotNull(ref.getName());
-<a name="259" href="#259">259</a>                     assertEquals(
-<a name="260" href="#260">260</a>                         expectedEncryptedElement,
-<a name="261" href="#261">261</a>                         ref.getName()
-<a name="262" href="#262">262</a>                     );
-<a name="263" href="#263">263</a>                 }
-<a name="264" href="#264">264</a>             }
-<a name="265" href="#265">265</a>         }
-<a name="266" href="#266">266</a>         assertTrue(encrypted);
-<a name="267" href="#267">267</a>     }
-<a name="268" href="#268">268</a> 
-<a name="269" href="#269">269</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> handle(Callback[] callbacks)
-<a name="270" href="#270">270</a>         <strong class="jxr_keyword">throws</strong> IOException, UnsupportedCallbackException {
-<a name="271" href="#271">271</a>         <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> i = 0; i &lt; callbacks.length; i++) {
-<a name="272" href="#272">272</a>             <strong class="jxr_keyword">if</strong> (callbacks[i] instanceof WSPasswordCallback) {
-<a name="273" href="#273">273</a>                 WSPasswordCallback pc = (WSPasswordCallback) callbacks[i];
-<a name="274" href="#274">274</a>                 <em class="jxr_comment">/*</em>
-<a name="275" href="#275">275</a> <em class="jxr_comment">                 * here call a function/method to lookup the password for</em>
-<a name="276" href="#276">276</a> <em class="jxr_comment">                 * the given identifier (e.g. a user name or keystore alias)</em>
-<a name="277" href="#277">277</a> <em class="jxr_comment">                 * e.g.: pc.setPassword(passStore.getPassword(pc.getIdentfifier))</em>
-<a name="278" href="#278">278</a> <em class="jxr_comment">                 * for Testing we supply a fixed name here.</em>
-<a name="279" href="#279">279</a> <em class="jxr_comment">                 */</em>
-<a name="280" href="#280">280</a>                 pc.setPassword(<span class="jxr_string">"security"</span>);
-<a name="281" href="#281">281</a>             } <strong class="jxr_keyword">else</strong> {
-<a name="282" href="#282">282</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> UnsupportedCallbackException(callbacks[i], <span class="jxr_string">"Unrecognized Callback"</span>);
-<a name="283" href="#283">283</a>             }
-<a name="284" href="#284">284</a>         }
-<a name="285" href="#285">285</a>     }
-<a name="286" href="#286">286</a> }
+<a name="236" href="#236">236</a>         <strong class="jxr_keyword">final</strong> java.util.List results = 
+<a name="237" href="#237">237</a>             secEngine.processSecurityHeader(doc, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">this</strong>, <strong class="jxr_keyword">null</strong>, crypto);
+<a name="238" href="#238">238</a>         String outputString = 
+<a name="239" href="#239">239</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
+<a name="240" href="#240">240</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"LogTestService2"</span>) &gt; 0 ? <strong class="jxr_keyword">true</strong> : false);
+<a name="241" href="#241">241</a>         <em class="jxr_comment">//</em>
+<a name="242" href="#242">242</a>         <em class="jxr_comment">// walk through the results, and make sure there is an encryption</em>
+<a name="243" href="#243">243</a>         <em class="jxr_comment">// action, together with a reference to the decrypted element </em>
+<a name="244" href="#244">244</a>         <em class="jxr_comment">// (as a QName)</em>
+<a name="245" href="#245">245</a>         <em class="jxr_comment">//</em>
+<a name="246" href="#246">246</a>         <strong class="jxr_keyword">boolean</strong> encrypted = false;
+<a name="247" href="#247">247</a>         <strong class="jxr_keyword">for</strong> (java.util.Iterator ipos = results.iterator(); ipos.hasNext();) {
+<a name="248" href="#248">248</a>             <strong class="jxr_keyword">final</strong> java.util.Map result = (java.util.Map) ipos.next();
+<a name="249" href="#249">249</a>             <strong class="jxr_keyword">final</strong> Integer action = (Integer) result.get(WSSecurityEngineResult.TAG_ACTION);
+<a name="250" href="#250">250</a>             assertNotNull(action);
+<a name="251" href="#251">251</a>             <strong class="jxr_keyword">if</strong> ((action.intValue() &amp; WSConstants.ENCR) != 0) {
+<a name="252" href="#252">252</a>                 <strong class="jxr_keyword">final</strong> java.util.List refs =
+<a name="253" href="#253">253</a>                     (java.util.List) result.get(WSSecurityEngineResult.TAG_DATA_REF_URIS);
+<a name="254" href="#254">254</a>                 assertNotNull(refs);
+<a name="255" href="#255">255</a>                 encrypted = <strong class="jxr_keyword">true</strong>;
+<a name="256" href="#256">256</a>                 <strong class="jxr_keyword">for</strong> (java.util.Iterator jpos = refs.iterator(); jpos.hasNext();) {
+<a name="257" href="#257">257</a>                     <strong class="jxr_keyword">final</strong> WSDataRef ref = (WSDataRef) jpos.next();
+<a name="258" href="#258">258</a>                     assertNotNull(ref);
+<a name="259" href="#259">259</a>                     assertNotNull(ref.getName());
+<a name="260" href="#260">260</a>                     assertEquals(
+<a name="261" href="#261">261</a>                         expectedEncryptedElement,
+<a name="262" href="#262">262</a>                         ref.getName()
+<a name="263" href="#263">263</a>                     );
+<a name="264" href="#264">264</a>                 }
+<a name="265" href="#265">265</a>             }
+<a name="266" href="#266">266</a>         }
+<a name="267" href="#267">267</a>         assertTrue(encrypted);
+<a name="268" href="#268">268</a>     }
+<a name="269" href="#269">269</a> 
+<a name="270" href="#270">270</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> handle(Callback[] callbacks)
+<a name="271" href="#271">271</a>         <strong class="jxr_keyword">throws</strong> IOException, UnsupportedCallbackException {
+<a name="272" href="#272">272</a>         <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> i = 0; i &lt; callbacks.length; i++) {
+<a name="273" href="#273">273</a>             <strong class="jxr_keyword">if</strong> (callbacks[i] instanceof WSPasswordCallback) {
+<a name="274" href="#274">274</a>                 WSPasswordCallback pc = (WSPasswordCallback) callbacks[i];
+<a name="275" href="#275">275</a>                 <em class="jxr_comment">/*</em>
+<a name="276" href="#276">276</a> <em class="jxr_comment">                 * here call a function/method to lookup the password for</em>
+<a name="277" href="#277">277</a> <em class="jxr_comment">                 * the given identifier (e.g. a user name or keystore alias)</em>
+<a name="278" href="#278">278</a> <em class="jxr_comment">                 * e.g.: pc.setPassword(passStore.getPassword(pc.getIdentfifier))</em>
+<a name="279" href="#279">279</a> <em class="jxr_comment">                 * for Testing we supply a fixed name here.</em>
+<a name="280" href="#280">280</a> <em class="jxr_comment">                 */</em>
+<a name="281" href="#281">281</a>                 pc.setPassword(<span class="jxr_string">"security"</span>);
+<a name="282" href="#282">282</a>             } <strong class="jxr_keyword">else</strong> {
+<a name="283" href="#283">283</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> UnsupportedCallbackException(callbacks[i], <span class="jxr_string">"Unrecognized Callback"</span>);
+<a name="284" href="#284">284</a>             }
+<a name="285" href="#285">285</a>         }
+<a name="286" href="#286">286</a>     }
+<a name="287" href="#287">287</a> }
 </pre>
 <hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
 </html>



---------------------------------------------------------------------
To unsubscribe, e-mail: wss4j-dev-unsubscribe@ws.apache.org
For additional commands, e-mail: wss4j-dev-help@ws.apache.org