Modified: webservices/wss4j/site/xref-test/org/apache/ws/security/message/SignatureCertTest.html URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref-test/org/apache/ws/security/message/SignatureCertTest.html?rev=1133081&r1=1133080&r2=1133081&view=diff ============================================================================== --- webservices/wss4j/site/xref-test/org/apache/ws/security/message/SignatureCertTest.html (original) +++ webservices/wss4j/site/xref-test/org/apache/ws/security/message/SignatureCertTest.html Tue Jun 7 16:25:20 2011 @@ -121,210 +121,216 @@ <a name="111" href="#111">111</a> <a name="112" href="#112">112</a> @org.junit.Test <a name="113" href="#113">113</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testBSTCertChain() <strong class="jxr_keyword">throws</strong> Exception { -<a name="114" href="#114">114</a> Crypto clientCrypto = CryptoFactory.getInstance(<span class="jxr_string">"wss40_client.properties"</span>); -<a name="115" href="#115">115</a> WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature(); -<a name="116" href="#116">116</a> sign.setUserInfo(<span class="jxr_string">"Client_CertChain"</span>, <span class="jxr_string">"password"</span>); -<a name="117" href="#117">117</a> sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE); -<a name="118" href="#118">118</a> sign.setUseSingleCertificate(false); -<a name="119" href="#119">119</a> -<a name="120" href="#120">120</a> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG); -<a name="121" href="#121">121</a> -<a name="122" href="#122">122</a> WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader(); -<a name="123" href="#123">123</a> secHeader.insertSecurityHeader(doc); -<a name="124" href="#124">124</a> Document signedDoc = sign.build(doc, clientCrypto, secHeader); -<a name="125" href="#125">125</a> -<a name="126" href="#126">126</a> <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) { -<a name="127" href="#127">127</a> String outputString = -<a name="128" href="#128">128</a> org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc); -<a name="129" href="#129">129</a> LOG.debug(<span class="jxr_string">"BST CA Cert"</span>); -<a name="130" href="#130">130</a> LOG.debug(outputString); -<a name="131" href="#131">131</a> } -<a name="132" href="#132">132</a> <em class="jxr_comment">//</em> -<a name="133" href="#133">133</a> <em class="jxr_comment">// Verify the signature</em> -<a name="134" href="#134">134</a> <em class="jxr_comment">//</em> -<a name="135" href="#135">135</a> Crypto serverCrypto = CryptoFactory.getInstance(<span class="jxr_string">"wss40_server.properties"</span>); -<a name="136" href="#136">136</a> List<WSSecurityEngineResult> results = verify(signedDoc, serverCrypto); -<a name="137" href="#137">137</a> WSSecurityEngineResult result = -<a name="138" href="#138">138</a> WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN); -<a name="139" href="#139">139</a> X509Certificate cert = -<a name="140" href="#140">140</a> (X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE); -<a name="141" href="#141">141</a> assertTrue (cert != <strong class="jxr_keyword">null</strong>); -<a name="142" href="#142">142</a> X509Certificate[] certs = -<a name="143" href="#143">143</a> (X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES); -<a name="144" href="#144">144</a> assertTrue (certs != <strong class="jxr_keyword">null</strong> && certs.length == 2); -<a name="145" href="#145">145</a> } -<a name="146" href="#146">146</a> -<a name="147" href="#147">147</a> <em class="jxr_javadoccomment">/**</em> -<a name="148" href="#148">148</a> <em class="jxr_javadoccomment"> * Test signing a SOAP message using a BST, sending the CA cert as well in the</em> -<a name="149" href="#149">149</a> <em class="jxr_javadoccomment"> * message.</em> -<a name="150" href="#150">150</a> <em class="jxr_javadoccomment"> */</em> -<a name="151" href="#151">151</a> @org.junit.Test -<a name="152" href="#152">152</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSignatureDirectReferenceCACert() <strong class="jxr_keyword">throws</strong> Exception { -<a name="153" href="#153">153</a> WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature(); -<a name="154" href="#154">154</a> sign.setUserInfo(<span class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>); -<a name="155" href="#155">155</a> sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE); -<a name="156" href="#156">156</a> sign.setUseSingleCertificate(false); -<a name="157" href="#157">157</a> -<a name="158" href="#158">158</a> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG); -<a name="159" href="#159">159</a> -<a name="160" href="#160">160</a> WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader(); -<a name="161" href="#161">161</a> secHeader.insertSecurityHeader(doc); -<a name="162" href="#162">162</a> Document signedDoc = sign.build(doc, crypto, secHeader); -<a name="163" href="#163">163</a> -<a name="164" href="#164">164</a> <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) { -<a name="165" href="#165">165</a> String outputString = -<a name="166" href="#166">166</a> org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc); -<a name="167" href="#167">167</a> LOG.debug(<span class="jxr_string">"BST CA Cert"</span>); -<a name="168" href="#168">168</a> LOG.debug(outputString); -<a name="169" href="#169">169</a> } -<a name="170" href="#170">170</a> <em class="jxr_comment">//</em> -<a name="171" href="#171">171</a> <em class="jxr_comment">// Verify the signature</em> -<a name="172" href="#172">172</a> <em class="jxr_comment">//</em> -<a name="173" href="#173">173</a> List<WSSecurityEngineResult> results = verify(signedDoc, cryptoCA); -<a name="174" href="#174">174</a> WSSecurityEngineResult result = -<a name="175" href="#175">175</a> WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN); -<a name="176" href="#176">176</a> X509Certificate cert = -<a name="177" href="#177">177</a> (X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE); -<a name="178" href="#178">178</a> assertTrue (cert != <strong class="jxr_keyword">null</strong>); -<a name="179" href="#179">179</a> X509Certificate[] certs = -<a name="180" href="#180">180</a> (X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES); -<a name="181" href="#181">181</a> assertTrue (certs != <strong class="jxr_keyword">null</strong> && certs.length == 2); -<a name="182" href="#182">182</a> } -<a name="183" href="#183">183</a> -<a name="184" href="#184">184</a> -<a name="185" href="#185">185</a> <em class="jxr_javadoccomment">/**</em> -<a name="186" href="#186">186</a> <em class="jxr_javadoccomment"> * Test signing a SOAP message using Issuer Serial. Note that this should fail, as the</em> -<a name="187" href="#187">187</a> <em class="jxr_javadoccomment"> * trust-store does not contain the cert corresponding to wss40, only the CA cert</em> -<a name="188" href="#188">188</a> <em class="jxr_javadoccomment"> * wss40CA.</em> -<a name="189" href="#189">189</a> <em class="jxr_javadoccomment"> */</em> -<a name="190" href="#190">190</a> @org.junit.Test -<a name="191" href="#191">191</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSignatureIssuerSerial() <strong class="jxr_keyword">throws</strong> Exception { -<a name="192" href="#192">192</a> WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature(); -<a name="193" href="#193">193</a> sign.setUserInfo(<span class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>); -<a name="194" href="#194">194</a> sign.setKeyIdentifierType(WSConstants.ISSUER_SERIAL); -<a name="195" href="#195">195</a> -<a name="196" href="#196">196</a> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG); -<a name="197" href="#197">197</a> -<a name="198" href="#198">198</a> WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader(); -<a name="199" href="#199">199</a> secHeader.insertSecurityHeader(doc); -<a name="200" href="#200">200</a> Document signedDoc = sign.build(doc, crypto, secHeader); -<a name="201" href="#201">201</a> -<a name="202" href="#202">202</a> <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) { -<a name="203" href="#203">203</a> String outputString = -<a name="204" href="#204">204</a> org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc); -<a name="205" href="#205">205</a> LOG.debug(outputString); -<a name="206" href="#206">206</a> } +<a name="114" href="#114">114</a> <em class="jxr_comment">//</em> +<a name="115" href="#115">115</a> <em class="jxr_comment">// This test fails with the IBM JDK</em> +<a name="116" href="#116">116</a> <em class="jxr_comment">//</em> +<a name="117" href="#117">117</a> <strong class="jxr_keyword">if</strong> (<span class="jxr_string">"IBM Corporation"</span>.equals(System.getProperty(<span class="jxr_string">"java.vendor"</span>))) { +<a name="118" href="#118">118</a> <strong class="jxr_keyword">return</strong>; +<a name="119" href="#119">119</a> } +<a name="120" href="#120">120</a> Crypto clientCrypto = CryptoFactory.getInstance(<span class="jxr_string">"wss40_client.properties"</span>); +<a name="121" href="#121">121</a> WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature(); +<a name="122" href="#122">122</a> sign.setUserInfo(<span class="jxr_string">"Client_CertChain"</span>, <span class="jxr_string">"password"</span>); +<a name="123" href="#123">123</a> sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE); +<a name="124" href="#124">124</a> sign.setUseSingleCertificate(false); +<a name="125" href="#125">125</a> +<a name="126" href="#126">126</a> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG); +<a name="127" href="#127">127</a> +<a name="128" href="#128">128</a> WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader(); +<a name="129" href="#129">129</a> secHeader.insertSecurityHeader(doc); +<a name="130" href="#130">130</a> Document signedDoc = sign.build(doc, clientCrypto, secHeader); +<a name="131" href="#131">131</a> +<a name="132" href="#132">132</a> <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) { +<a name="133" href="#133">133</a> String outputString = +<a name="134" href="#134">134</a> org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc); +<a name="135" href="#135">135</a> LOG.debug(<span class="jxr_string">"BST CA Cert"</span>); +<a name="136" href="#136">136</a> LOG.debug(outputString); +<a name="137" href="#137">137</a> } +<a name="138" href="#138">138</a> <em class="jxr_comment">//</em> +<a name="139" href="#139">139</a> <em class="jxr_comment">// Verify the signature</em> +<a name="140" href="#140">140</a> <em class="jxr_comment">//</em> +<a name="141" href="#141">141</a> Crypto serverCrypto = CryptoFactory.getInstance(<span class="jxr_string">"wss40_server.properties"</span>); +<a name="142" href="#142">142</a> List<WSSecurityEngineResult> results = verify(signedDoc, serverCrypto); +<a name="143" href="#143">143</a> WSSecurityEngineResult result = +<a name="144" href="#144">144</a> WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN); +<a name="145" href="#145">145</a> X509Certificate cert = +<a name="146" href="#146">146</a> (X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE); +<a name="147" href="#147">147</a> assertTrue (cert != <strong class="jxr_keyword">null</strong>); +<a name="148" href="#148">148</a> X509Certificate[] certs = +<a name="149" href="#149">149</a> (X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES); +<a name="150" href="#150">150</a> assertTrue (certs != <strong class="jxr_keyword">null</strong> && certs.length == 2); +<a name="151" href="#151">151</a> } +<a name="152" href="#152">152</a> +<a name="153" href="#153">153</a> <em class="jxr_javadoccomment">/**</em> +<a name="154" href="#154">154</a> <em class="jxr_javadoccomment"> * Test signing a SOAP message using a BST, sending the CA cert as well in the</em> +<a name="155" href="#155">155</a> <em class="jxr_javadoccomment"> * message.</em> +<a name="156" href="#156">156</a> <em class="jxr_javadoccomment"> */</em> +<a name="157" href="#157">157</a> @org.junit.Test +<a name="158" href="#158">158</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSignatureDirectReferenceCACert() <strong class="jxr_keyword">throws</strong> Exception { +<a name="159" href="#159">159</a> WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature(); +<a name="160" href="#160">160</a> sign.setUserInfo(<span class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>); +<a name="161" href="#161">161</a> sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE); +<a name="162" href="#162">162</a> sign.setUseSingleCertificate(false); +<a name="163" href="#163">163</a> +<a name="164" href="#164">164</a> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG); +<a name="165" href="#165">165</a> +<a name="166" href="#166">166</a> WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader(); +<a name="167" href="#167">167</a> secHeader.insertSecurityHeader(doc); +<a name="168" href="#168">168</a> Document signedDoc = sign.build(doc, crypto, secHeader); +<a name="169" href="#169">169</a> +<a name="170" href="#170">170</a> <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) { +<a name="171" href="#171">171</a> String outputString = +<a name="172" href="#172">172</a> org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc); +<a name="173" href="#173">173</a> LOG.debug(<span class="jxr_string">"BST CA Cert"</span>); +<a name="174" href="#174">174</a> LOG.debug(outputString); +<a name="175" href="#175">175</a> } +<a name="176" href="#176">176</a> <em class="jxr_comment">//</em> +<a name="177" href="#177">177</a> <em class="jxr_comment">// Verify the signature</em> +<a name="178" href="#178">178</a> <em class="jxr_comment">//</em> +<a name="179" href="#179">179</a> List<WSSecurityEngineResult> results = verify(signedDoc, cryptoCA); +<a name="180" href="#180">180</a> WSSecurityEngineResult result = +<a name="181" href="#181">181</a> WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN); +<a name="182" href="#182">182</a> X509Certificate cert = +<a name="183" href="#183">183</a> (X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE); +<a name="184" href="#184">184</a> assertTrue (cert != <strong class="jxr_keyword">null</strong>); +<a name="185" href="#185">185</a> X509Certificate[] certs = +<a name="186" href="#186">186</a> (X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES); +<a name="187" href="#187">187</a> assertTrue (certs != <strong class="jxr_keyword">null</strong> && certs.length == 2); +<a name="188" href="#188">188</a> } +<a name="189" href="#189">189</a> +<a name="190" href="#190">190</a> +<a name="191" href="#191">191</a> <em class="jxr_javadoccomment">/**</em> +<a name="192" href="#192">192</a> <em class="jxr_javadoccomment"> * Test signing a SOAP message using Issuer Serial. Note that this should fail, as the</em> +<a name="193" href="#193">193</a> <em class="jxr_javadoccomment"> * trust-store does not contain the cert corresponding to wss40, only the CA cert</em> +<a name="194" href="#194">194</a> <em class="jxr_javadoccomment"> * wss40CA.</em> +<a name="195" href="#195">195</a> <em class="jxr_javadoccomment"> */</em> +<a name="196" href="#196">196</a> @org.junit.Test +<a name="197" href="#197">197</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSignatureIssuerSerial() <strong class="jxr_keyword">throws</strong> Exception { +<a name="198" href="#198">198</a> WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature(); +<a name="199" href="#199">199</a> sign.setUserInfo(<span class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>); +<a name="200" href="#200">200</a> sign.setKeyIdentifierType(WSConstants.ISSUER_SERIAL); +<a name="201" href="#201">201</a> +<a name="202" href="#202">202</a> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG); +<a name="203" href="#203">203</a> +<a name="204" href="#204">204</a> WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader(); +<a name="205" href="#205">205</a> secHeader.insertSecurityHeader(doc); +<a name="206" href="#206">206</a> Document signedDoc = sign.build(doc, crypto, secHeader); <a name="207" href="#207">207</a> -<a name="208" href="#208">208</a> <strong class="jxr_keyword">try</strong> { -<a name="209" href="#209">209</a> verify(signedDoc, cryptoCA); -<a name="210" href="#210">210</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> Exception(<span class="jxr_string">"Failure expected on issuer serial"</span>); -<a name="211" href="#211">211</a> } <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) { -<a name="212" href="#212">212</a> assertTrue(ex.getErrorCode() == WSSecurityException.FAILED_CHECK); -<a name="213" href="#213">213</a> <em class="jxr_comment">// expected</em> -<a name="214" href="#214">214</a> } -<a name="215" href="#215">215</a> } -<a name="216" href="#216">216</a> -<a name="217" href="#217">217</a> -<a name="218" href="#218">218</a> <em class="jxr_javadoccomment">/**</em> -<a name="219" href="#219">219</a> <em class="jxr_javadoccomment"> * Test signing a SOAP message using a BST. The signature verification passes, but the trust</em> -<a name="220" href="#220">220</a> <em class="jxr_javadoccomment"> * verification will fail as the CA cert is out of date.</em> -<a name="221" href="#221">221</a> <em class="jxr_javadoccomment"> */</em> -<a name="222" href="#222">222</a> @org.junit.Test -<a name="223" href="#223">223</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSignatureBadCACert() <strong class="jxr_keyword">throws</strong> Exception { -<a name="224" href="#224">224</a> WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature(); -<a name="225" href="#225">225</a> sign.setUserInfo(<span class="jxr_string">"wss4jcertdsa"</span>, <span class="jxr_string">"security"</span>); -<a name="226" href="#226">226</a> sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE); -<a name="227" href="#227">227</a> -<a name="228" href="#228">228</a> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG); -<a name="229" href="#229">229</a> -<a name="230" href="#230">230</a> WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader(); -<a name="231" href="#231">231</a> secHeader.insertSecurityHeader(doc); -<a name="232" href="#232">232</a> Document signedDoc = -<a name="233" href="#233">233</a> sign.build(doc, CryptoFactory.getInstance(<span class="jxr_string">"wss40badca.properties"</span>), secHeader); -<a name="234" href="#234">234</a> -<a name="235" href="#235">235</a> <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) { -<a name="236" href="#236">236</a> String outputString = -<a name="237" href="#237">237</a> org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc); -<a name="238" href="#238">238</a> LOG.debug(outputString); -<a name="239" href="#239">239</a> } -<a name="240" href="#240">240</a> <em class="jxr_comment">//</em> -<a name="241" href="#241">241</a> <em class="jxr_comment">// Verify the signature</em> -<a name="242" href="#242">242</a> <em class="jxr_comment">//</em> -<a name="243" href="#243">243</a> <strong class="jxr_keyword">try</strong> { -<a name="244" href="#244">244</a> verify(signedDoc, CryptoFactory.getInstance(<span class="jxr_string">"wss40badcatrust.properties"</span>)); -<a name="245" href="#245">245</a> fail(<span class="jxr_string">"Failure expected on bad CA cert!"</span>); -<a name="246" href="#246">246</a> } <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) { -<a name="247" href="#247">247</a> <em class="jxr_comment">// expected</em> -<a name="248" href="#248">248</a> } -<a name="249" href="#249">249</a> } -<a name="250" href="#250">250</a> -<a name="251" href="#251">251</a> <em class="jxr_javadoccomment">/**</em> -<a name="252" href="#252">252</a> <em class="jxr_javadoccomment"> * A test for "SignatureAction does not set DigestAlgorithm on WSSecSignature instance"</em> -<a name="253" href="#253">253</a> <em class="jxr_javadoccomment"> */</em> -<a name="254" href="#254">254</a> @org.junit.Test -<a name="255" href="#255">255</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testMultipleCertsWSHandler() <strong class="jxr_keyword">throws</strong> Exception { -<a name="256" href="#256">256</a> <strong class="jxr_keyword">final</strong> WSSConfig cfg = WSSConfig.getNewInstance(); -<a name="257" href="#257">257</a> <strong class="jxr_keyword">final</strong> <strong class="jxr_keyword">int</strong> action = WSConstants.SIGN; -<a name="258" href="#258">258</a> <strong class="jxr_keyword">final</strong> RequestData reqData = <strong class="jxr_keyword">new</strong> RequestData(); -<a name="259" href="#259">259</a> reqData.setWssConfig(cfg); -<a name="260" href="#260">260</a> reqData.setUsername(<span class="jxr_string">"wss40"</span>); -<a name="261" href="#261">261</a> java.util.Map<String, String> config = <strong class="jxr_keyword">new</strong> java.util.TreeMap<String, String>(); -<a name="262" href="#262">262</a> config.put(WSHandlerConstants.SIG_PROP_FILE, <span class="jxr_string">"wss40.properties"</span>); -<a name="263" href="#263">263</a> config.put(<span class="jxr_string">"password"</span>, <span class="jxr_string">"security"</span>); -<a name="264" href="#264">264</a> config.put(WSHandlerConstants.SIG_KEY_ID, <span class="jxr_string">"DirectReference"</span>); -<a name="265" href="#265">265</a> config.put(WSHandlerConstants.USE_SINGLE_CERTIFICATE, <span class="jxr_string">"false"</span>); -<a name="266" href="#266">266</a> reqData.setMsgContext(config); -<a name="267" href="#267">267</a> -<a name="268" href="#268">268</a> <strong class="jxr_keyword">final</strong> java.util.List<Integer> actions = <strong class="jxr_keyword">new</strong> java.util.ArrayList<Integer>(); -<a name="269" href="#269">269</a> actions.add(<strong class="jxr_keyword">new</strong> Integer(action)); -<a name="270" href="#270">270</a> <strong class="jxr_keyword">final</strong> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG); -<a name="271" href="#271">271</a> <a href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a> handler = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a>(); -<a name="272" href="#272">272</a> handler.send( -<a name="273" href="#273">273</a> action, -<a name="274" href="#274">274</a> doc, -<a name="275" href="#275">275</a> reqData, -<a name="276" href="#276">276</a> actions, -<a name="277" href="#277">277</a> <strong class="jxr_keyword">true</strong> -<a name="278" href="#278">278</a> ); -<a name="279" href="#279">279</a> -<a name="280" href="#280">280</a> <em class="jxr_comment">//</em> -<a name="281" href="#281">281</a> <em class="jxr_comment">// Verify the signature</em> -<a name="282" href="#282">282</a> <em class="jxr_comment">//</em> -<a name="283" href="#283">283</a> List<WSSecurityEngineResult> results = verify(doc, cryptoCA); -<a name="284" href="#284">284</a> WSSecurityEngineResult result = -<a name="285" href="#285">285</a> WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN); -<a name="286" href="#286">286</a> X509Certificate cert = -<a name="287" href="#287">287</a> (X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE); -<a name="288" href="#288">288</a> assertTrue (cert != <strong class="jxr_keyword">null</strong>); -<a name="289" href="#289">289</a> X509Certificate[] certs = -<a name="290" href="#290">290</a> (X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES); -<a name="291" href="#291">291</a> assertTrue (certs != <strong class="jxr_keyword">null</strong> && certs.length == 2); -<a name="292" href="#292">292</a> } -<a name="293" href="#293">293</a> -<a name="294" href="#294">294</a> -<a name="295" href="#295">295</a> <em class="jxr_javadoccomment">/**</em> -<a name="296" href="#296">296</a> <em class="jxr_javadoccomment"> * Verifies the soap envelope</em> -<a name="297" href="#297">297</a> <em class="jxr_javadoccomment"> * <p/></em> -<a name="298" href="#298">298</a> <em class="jxr_javadoccomment"> * </em> -<a name="299" href="#299">299</a> <em class="jxr_javadoccomment"> * @param doc </em> -<a name="300" href="#300">300</a> <em class="jxr_javadoccomment"> * @throws Exception Thrown when there is a problem in verification</em> -<a name="301" href="#301">301</a> <em class="jxr_javadoccomment"> */</em> -<a name="302" href="#302">302</a> <strong class="jxr_keyword">private</strong> List<WSSecurityEngineResult> -<a name="303" href="#303">303</a> verify(Document doc, Crypto crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException { -<a name="304" href="#304">304</a> List<WSSecurityEngineResult> results = secEngine.processSecurityHeader( -<a name="305" href="#305">305</a> doc, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, crypto -<a name="306" href="#306">306</a> ); -<a name="307" href="#307">307</a> <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) { -<a name="308" href="#308">308</a> LOG.debug(<span class="jxr_string">"Verfied and decrypted message:"</span>); -<a name="309" href="#309">309</a> String outputString = -<a name="310" href="#310">310</a> org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc); -<a name="311" href="#311">311</a> LOG.debug(outputString); -<a name="312" href="#312">312</a> } -<a name="313" href="#313">313</a> <strong class="jxr_keyword">return</strong> results; -<a name="314" href="#314">314</a> } -<a name="315" href="#315">315</a> -<a name="316" href="#316">316</a> -<a name="317" href="#317">317</a> } +<a name="208" href="#208">208</a> <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) { +<a name="209" href="#209">209</a> String outputString = +<a name="210" href="#210">210</a> org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc); +<a name="211" href="#211">211</a> LOG.debug(outputString); +<a name="212" href="#212">212</a> } +<a name="213" href="#213">213</a> +<a name="214" href="#214">214</a> <strong class="jxr_keyword">try</strong> { +<a name="215" href="#215">215</a> verify(signedDoc, cryptoCA); +<a name="216" href="#216">216</a> <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> Exception(<span class="jxr_string">"Failure expected on issuer serial"</span>); +<a name="217" href="#217">217</a> } <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) { +<a name="218" href="#218">218</a> assertTrue(ex.getErrorCode() == WSSecurityException.FAILED_CHECK); +<a name="219" href="#219">219</a> <em class="jxr_comment">// expected</em> +<a name="220" href="#220">220</a> } +<a name="221" href="#221">221</a> } +<a name="222" href="#222">222</a> +<a name="223" href="#223">223</a> +<a name="224" href="#224">224</a> <em class="jxr_javadoccomment">/**</em> +<a name="225" href="#225">225</a> <em class="jxr_javadoccomment"> * Test signing a SOAP message using a BST. The signature verification passes, but the trust</em> +<a name="226" href="#226">226</a> <em class="jxr_javadoccomment"> * verification will fail as the CA cert is out of date.</em> +<a name="227" href="#227">227</a> <em class="jxr_javadoccomment"> */</em> +<a name="228" href="#228">228</a> @org.junit.Test +<a name="229" href="#229">229</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSignatureBadCACert() <strong class="jxr_keyword">throws</strong> Exception { +<a name="230" href="#230">230</a> WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature(); +<a name="231" href="#231">231</a> sign.setUserInfo(<span class="jxr_string">"wss4jcertdsa"</span>, <span class="jxr_string">"security"</span>); +<a name="232" href="#232">232</a> sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE); +<a name="233" href="#233">233</a> +<a name="234" href="#234">234</a> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG); +<a name="235" href="#235">235</a> +<a name="236" href="#236">236</a> WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader(); +<a name="237" href="#237">237</a> secHeader.insertSecurityHeader(doc); +<a name="238" href="#238">238</a> Document signedDoc = +<a name="239" href="#239">239</a> sign.build(doc, CryptoFactory.getInstance(<span class="jxr_string">"wss40badca.properties"</span>), secHeader); +<a name="240" href="#240">240</a> +<a name="241" href="#241">241</a> <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) { +<a name="242" href="#242">242</a> String outputString = +<a name="243" href="#243">243</a> org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc); +<a name="244" href="#244">244</a> LOG.debug(outputString); +<a name="245" href="#245">245</a> } +<a name="246" href="#246">246</a> <em class="jxr_comment">//</em> +<a name="247" href="#247">247</a> <em class="jxr_comment">// Verify the signature</em> +<a name="248" href="#248">248</a> <em class="jxr_comment">//</em> +<a name="249" href="#249">249</a> <strong class="jxr_keyword">try</strong> { +<a name="250" href="#250">250</a> verify(signedDoc, CryptoFactory.getInstance(<span class="jxr_string">"wss40badcatrust.properties"</span>)); +<a name="251" href="#251">251</a> fail(<span class="jxr_string">"Failure expected on bad CA cert!"</span>); +<a name="252" href="#252">252</a> } <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) { +<a name="253" href="#253">253</a> <em class="jxr_comment">// expected</em> +<a name="254" href="#254">254</a> } +<a name="255" href="#255">255</a> } +<a name="256" href="#256">256</a> +<a name="257" href="#257">257</a> <em class="jxr_javadoccomment">/**</em> +<a name="258" href="#258">258</a> <em class="jxr_javadoccomment"> * A test for "SignatureAction does not set DigestAlgorithm on WSSecSignature instance"</em> +<a name="259" href="#259">259</a> <em class="jxr_javadoccomment"> */</em> +<a name="260" href="#260">260</a> @org.junit.Test +<a name="261" href="#261">261</a> <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testMultipleCertsWSHandler() <strong class="jxr_keyword">throws</strong> Exception { +<a name="262" href="#262">262</a> <strong class="jxr_keyword">final</strong> WSSConfig cfg = WSSConfig.getNewInstance(); +<a name="263" href="#263">263</a> <strong class="jxr_keyword">final</strong> <strong class="jxr_keyword">int</strong> action = WSConstants.SIGN; +<a name="264" href="#264">264</a> <strong class="jxr_keyword">final</strong> RequestData reqData = <strong class="jxr_keyword">new</strong> RequestData(); +<a name="265" href="#265">265</a> reqData.setWssConfig(cfg); +<a name="266" href="#266">266</a> reqData.setUsername(<span class="jxr_string">"wss40"</span>); +<a name="267" href="#267">267</a> java.util.Map<String, String> config = <strong class="jxr_keyword">new</strong> java.util.TreeMap<String, String>(); +<a name="268" href="#268">268</a> config.put(WSHandlerConstants.SIG_PROP_FILE, <span class="jxr_string">"wss40.properties"</span>); +<a name="269" href="#269">269</a> config.put(<span class="jxr_string">"password"</span>, <span class="jxr_string">"security"</span>); +<a name="270" href="#270">270</a> config.put(WSHandlerConstants.SIG_KEY_ID, <span class="jxr_string">"DirectReference"</span>); +<a name="271" href="#271">271</a> config.put(WSHandlerConstants.USE_SINGLE_CERTIFICATE, <span class="jxr_string">"false"</span>); +<a name="272" href="#272">272</a> reqData.setMsgContext(config); +<a name="273" href="#273">273</a> +<a name="274" href="#274">274</a> <strong class="jxr_keyword">final</strong> java.util.List<Integer> actions = <strong class="jxr_keyword">new</strong> java.util.ArrayList<Integer>(); +<a name="275" href="#275">275</a> actions.add(<strong class="jxr_keyword">new</strong> Integer(action)); +<a name="276" href="#276">276</a> <strong class="jxr_keyword">final</strong> Document doc = SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG); +<a name="277" href="#277">277</a> <a href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a> handler = <strong class="jxr_keyword">new</strong> <a href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a>(); +<a name="278" href="#278">278</a> handler.send( +<a name="279" href="#279">279</a> action, +<a name="280" href="#280">280</a> doc, +<a name="281" href="#281">281</a> reqData, +<a name="282" href="#282">282</a> actions, +<a name="283" href="#283">283</a> <strong class="jxr_keyword">true</strong> +<a name="284" href="#284">284</a> ); +<a name="285" href="#285">285</a> +<a name="286" href="#286">286</a> <em class="jxr_comment">//</em> +<a name="287" href="#287">287</a> <em class="jxr_comment">// Verify the signature</em> +<a name="288" href="#288">288</a> <em class="jxr_comment">//</em> +<a name="289" href="#289">289</a> List<WSSecurityEngineResult> results = verify(doc, cryptoCA); +<a name="290" href="#290">290</a> WSSecurityEngineResult result = +<a name="291" href="#291">291</a> WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN); +<a name="292" href="#292">292</a> X509Certificate cert = +<a name="293" href="#293">293</a> (X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE); +<a name="294" href="#294">294</a> assertTrue (cert != <strong class="jxr_keyword">null</strong>); +<a name="295" href="#295">295</a> X509Certificate[] certs = +<a name="296" href="#296">296</a> (X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES); +<a name="297" href="#297">297</a> assertTrue (certs != <strong class="jxr_keyword">null</strong> && certs.length == 2); +<a name="298" href="#298">298</a> } +<a name="299" href="#299">299</a> +<a name="300" href="#300">300</a> +<a name="301" href="#301">301</a> <em class="jxr_javadoccomment">/**</em> +<a name="302" href="#302">302</a> <em class="jxr_javadoccomment"> * Verifies the soap envelope</em> +<a name="303" href="#303">303</a> <em class="jxr_javadoccomment"> * <p/></em> +<a name="304" href="#304">304</a> <em class="jxr_javadoccomment"> * </em> +<a name="305" href="#305">305</a> <em class="jxr_javadoccomment"> * @param doc </em> +<a name="306" href="#306">306</a> <em class="jxr_javadoccomment"> * @throws Exception Thrown when there is a problem in verification</em> +<a name="307" href="#307">307</a> <em class="jxr_javadoccomment"> */</em> +<a name="308" href="#308">308</a> <strong class="jxr_keyword">private</strong> List<WSSecurityEngineResult> +<a name="309" href="#309">309</a> verify(Document doc, Crypto crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException { +<a name="310" href="#310">310</a> List<WSSecurityEngineResult> results = secEngine.processSecurityHeader( +<a name="311" href="#311">311</a> doc, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, crypto +<a name="312" href="#312">312</a> ); +<a name="313" href="#313">313</a> <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) { +<a name="314" href="#314">314</a> LOG.debug(<span class="jxr_string">"Verfied and decrypted message:"</span>); +<a name="315" href="#315">315</a> String outputString = +<a name="316" href="#316">316</a> org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc); +<a name="317" href="#317">317</a> LOG.debug(outputString); +<a name="318" href="#318">318</a> } +<a name="319" href="#319">319</a> <strong class="jxr_keyword">return</strong> results; +<a name="320" href="#320">320</a> } +<a name="321" href="#321">321</a> +<a name="322" href="#322">322</a> +<a name="323" href="#323">323</a> } </pre> <hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body> </html>
