Modified: 
webservices/wss4j/site/xref-test/org/apache/ws/security/message/SignatureCertTest.html
URL: 
http://svn.apache.org/viewvc/webservices/wss4j/site/xref-test/org/apache/ws/security/message/SignatureCertTest.html?rev=1133081&r1=1133080&r2=1133081&view=diff
==============================================================================
--- 
webservices/wss4j/site/xref-test/org/apache/ws/security/message/SignatureCertTest.html
 (original)
+++ 
webservices/wss4j/site/xref-test/org/apache/ws/security/message/SignatureCertTest.html
 Tue Jun  7 16:25:20 2011
@@ -121,210 +121,216 @@
 <a name="111" href="#111">111</a>     
 <a name="112" href="#112">112</a>     @org.junit.Test
 <a name="113" href="#113">113</a>     <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
testBSTCertChain() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="114" href="#114">114</a>         Crypto clientCrypto = 
CryptoFactory.getInstance(<span 
class="jxr_string">"wss40_client.properties"</span>);
-<a name="115" href="#115">115</a>         WSSecSignature sign = <strong 
class="jxr_keyword">new</strong> WSSecSignature();
-<a name="116" href="#116">116</a>         sign.setUserInfo(<span 
class="jxr_string">"Client_CertChain"</span>, <span 
class="jxr_string">"password"</span>);
-<a name="117" href="#117">117</a>         
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
-<a name="118" href="#118">118</a>         sign.setUseSingleCertificate(false);
-<a name="119" href="#119">119</a>        
-<a name="120" href="#120">120</a>         Document doc = 
SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="121" href="#121">121</a>         
-<a name="122" href="#122">122</a>         WSSecHeader secHeader = <strong 
class="jxr_keyword">new</strong> WSSecHeader();
-<a name="123" href="#123">123</a>         secHeader.insertSecurityHeader(doc);
-<a name="124" href="#124">124</a>         Document signedDoc = sign.build(doc, 
clientCrypto, secHeader);
-<a name="125" href="#125">125</a>                 
-<a name="126" href="#126">126</a>         <strong 
class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="127" href="#127">127</a>             String outputString = 
-<a name="128" href="#128">128</a>                 
org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
-<a name="129" href="#129">129</a>             LOG.debug(<span 
class="jxr_string">"BST CA Cert"</span>);
-<a name="130" href="#130">130</a>             LOG.debug(outputString);
-<a name="131" href="#131">131</a>         }
-<a name="132" href="#132">132</a>         <em class="jxr_comment">//</em>
-<a name="133" href="#133">133</a>         <em class="jxr_comment">// Verify 
the signature</em>
-<a name="134" href="#134">134</a>         <em class="jxr_comment">//</em>
-<a name="135" href="#135">135</a>         Crypto serverCrypto = 
CryptoFactory.getInstance(<span 
class="jxr_string">"wss40_server.properties"</span>);
-<a name="136" href="#136">136</a>         List&lt;WSSecurityEngineResult&gt; 
results = verify(signedDoc, serverCrypto);
-<a name="137" href="#137">137</a>         WSSecurityEngineResult result = 
-<a name="138" href="#138">138</a>             
WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN);
-<a name="139" href="#139">139</a>         X509Certificate cert = 
-<a name="140" href="#140">140</a>             
(X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
-<a name="141" href="#141">141</a>         assertTrue (cert != <strong 
class="jxr_keyword">null</strong>);
-<a name="142" href="#142">142</a>         X509Certificate[] certs = 
-<a name="143" href="#143">143</a>             
(X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES);
-<a name="144" href="#144">144</a>         assertTrue (certs != <strong 
class="jxr_keyword">null</strong> &amp;&amp; certs.length == 2);
-<a name="145" href="#145">145</a>     }
-<a name="146" href="#146">146</a>     
-<a name="147" href="#147">147</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="148" href="#148">148</a> <em class="jxr_javadoccomment">     * Test 
signing a SOAP message using a BST, sending the CA cert as well in the</em>
-<a name="149" href="#149">149</a> <em class="jxr_javadoccomment">     * 
message.</em>
-<a name="150" href="#150">150</a> <em class="jxr_javadoccomment">     */</em>
-<a name="151" href="#151">151</a>     @org.junit.Test
-<a name="152" href="#152">152</a>     <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
testSignatureDirectReferenceCACert() <strong 
class="jxr_keyword">throws</strong> Exception {
-<a name="153" href="#153">153</a>         WSSecSignature sign = <strong 
class="jxr_keyword">new</strong> WSSecSignature();
-<a name="154" href="#154">154</a>         sign.setUserInfo(<span 
class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>);
-<a name="155" href="#155">155</a>         
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
-<a name="156" href="#156">156</a>         sign.setUseSingleCertificate(false);
-<a name="157" href="#157">157</a> 
-<a name="158" href="#158">158</a>         Document doc = 
SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="159" href="#159">159</a> 
-<a name="160" href="#160">160</a>         WSSecHeader secHeader = <strong 
class="jxr_keyword">new</strong> WSSecHeader();
-<a name="161" href="#161">161</a>         secHeader.insertSecurityHeader(doc);
-<a name="162" href="#162">162</a>         Document signedDoc = sign.build(doc, 
crypto, secHeader);
-<a name="163" href="#163">163</a>         
-<a name="164" href="#164">164</a>         <strong 
class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="165" href="#165">165</a>             String outputString = 
-<a name="166" href="#166">166</a>                 
org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
-<a name="167" href="#167">167</a>             LOG.debug(<span 
class="jxr_string">"BST CA Cert"</span>);
-<a name="168" href="#168">168</a>             LOG.debug(outputString);
-<a name="169" href="#169">169</a>         }
-<a name="170" href="#170">170</a>         <em class="jxr_comment">//</em>
-<a name="171" href="#171">171</a>         <em class="jxr_comment">// Verify 
the signature</em>
-<a name="172" href="#172">172</a>         <em class="jxr_comment">//</em>
-<a name="173" href="#173">173</a>         List&lt;WSSecurityEngineResult&gt; 
results = verify(signedDoc, cryptoCA);
-<a name="174" href="#174">174</a>         WSSecurityEngineResult result = 
-<a name="175" href="#175">175</a>             
WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN);
-<a name="176" href="#176">176</a>         X509Certificate cert = 
-<a name="177" href="#177">177</a>             
(X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
-<a name="178" href="#178">178</a>         assertTrue (cert != <strong 
class="jxr_keyword">null</strong>);
-<a name="179" href="#179">179</a>         X509Certificate[] certs = 
-<a name="180" href="#180">180</a>             
(X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES);
-<a name="181" href="#181">181</a>         assertTrue (certs != <strong 
class="jxr_keyword">null</strong> &amp;&amp; certs.length == 2);
-<a name="182" href="#182">182</a>     }
-<a name="183" href="#183">183</a>     
-<a name="184" href="#184">184</a>     
-<a name="185" href="#185">185</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="186" href="#186">186</a> <em class="jxr_javadoccomment">     * Test 
signing a SOAP message using Issuer Serial. Note that this should fail, as 
the</em>
-<a name="187" href="#187">187</a> <em class="jxr_javadoccomment">     * 
trust-store does not contain the cert corresponding to wss40, only the CA 
cert</em>
-<a name="188" href="#188">188</a> <em class="jxr_javadoccomment">     * 
wss40CA.</em>
-<a name="189" href="#189">189</a> <em class="jxr_javadoccomment">     */</em>
-<a name="190" href="#190">190</a>     @org.junit.Test
-<a name="191" href="#191">191</a>     <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
testSignatureIssuerSerial() <strong class="jxr_keyword">throws</strong> 
Exception {
-<a name="192" href="#192">192</a>         WSSecSignature sign = <strong 
class="jxr_keyword">new</strong> WSSecSignature();
-<a name="193" href="#193">193</a>         sign.setUserInfo(<span 
class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>);
-<a name="194" href="#194">194</a>         
sign.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
-<a name="195" href="#195">195</a> 
-<a name="196" href="#196">196</a>         Document doc = 
SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="197" href="#197">197</a> 
-<a name="198" href="#198">198</a>         WSSecHeader secHeader = <strong 
class="jxr_keyword">new</strong> WSSecHeader();
-<a name="199" href="#199">199</a>         secHeader.insertSecurityHeader(doc);
-<a name="200" href="#200">200</a>         Document signedDoc = sign.build(doc, 
crypto, secHeader);
-<a name="201" href="#201">201</a>         
-<a name="202" href="#202">202</a>         <strong 
class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="203" href="#203">203</a>             String outputString = 
-<a name="204" href="#204">204</a>                 
org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
-<a name="205" href="#205">205</a>             LOG.debug(outputString);
-<a name="206" href="#206">206</a>         }
+<a name="114" href="#114">114</a>         <em class="jxr_comment">//</em>
+<a name="115" href="#115">115</a>         <em class="jxr_comment">// This test 
fails with the IBM JDK</em>
+<a name="116" href="#116">116</a>         <em class="jxr_comment">//</em>
+<a name="117" href="#117">117</a>         <strong 
class="jxr_keyword">if</strong> (<span class="jxr_string">"IBM 
Corporation"</span>.equals(System.getProperty(<span 
class="jxr_string">"java.vendor"</span>))) {
+<a name="118" href="#118">118</a>             <strong 
class="jxr_keyword">return</strong>;
+<a name="119" href="#119">119</a>         }
+<a name="120" href="#120">120</a>         Crypto clientCrypto = 
CryptoFactory.getInstance(<span 
class="jxr_string">"wss40_client.properties"</span>);
+<a name="121" href="#121">121</a>         WSSecSignature sign = <strong 
class="jxr_keyword">new</strong> WSSecSignature();
+<a name="122" href="#122">122</a>         sign.setUserInfo(<span 
class="jxr_string">"Client_CertChain"</span>, <span 
class="jxr_string">"password"</span>);
+<a name="123" href="#123">123</a>         
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
+<a name="124" href="#124">124</a>         sign.setUseSingleCertificate(false);
+<a name="125" href="#125">125</a>        
+<a name="126" href="#126">126</a>         Document doc = 
SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="127" href="#127">127</a>         
+<a name="128" href="#128">128</a>         WSSecHeader secHeader = <strong 
class="jxr_keyword">new</strong> WSSecHeader();
+<a name="129" href="#129">129</a>         secHeader.insertSecurityHeader(doc);
+<a name="130" href="#130">130</a>         Document signedDoc = sign.build(doc, 
clientCrypto, secHeader);
+<a name="131" href="#131">131</a>                 
+<a name="132" href="#132">132</a>         <strong 
class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="133" href="#133">133</a>             String outputString = 
+<a name="134" href="#134">134</a>                 
org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
+<a name="135" href="#135">135</a>             LOG.debug(<span 
class="jxr_string">"BST CA Cert"</span>);
+<a name="136" href="#136">136</a>             LOG.debug(outputString);
+<a name="137" href="#137">137</a>         }
+<a name="138" href="#138">138</a>         <em class="jxr_comment">//</em>
+<a name="139" href="#139">139</a>         <em class="jxr_comment">// Verify 
the signature</em>
+<a name="140" href="#140">140</a>         <em class="jxr_comment">//</em>
+<a name="141" href="#141">141</a>         Crypto serverCrypto = 
CryptoFactory.getInstance(<span 
class="jxr_string">"wss40_server.properties"</span>);
+<a name="142" href="#142">142</a>         List&lt;WSSecurityEngineResult&gt; 
results = verify(signedDoc, serverCrypto);
+<a name="143" href="#143">143</a>         WSSecurityEngineResult result = 
+<a name="144" href="#144">144</a>             
WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN);
+<a name="145" href="#145">145</a>         X509Certificate cert = 
+<a name="146" href="#146">146</a>             
(X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
+<a name="147" href="#147">147</a>         assertTrue (cert != <strong 
class="jxr_keyword">null</strong>);
+<a name="148" href="#148">148</a>         X509Certificate[] certs = 
+<a name="149" href="#149">149</a>             
(X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES);
+<a name="150" href="#150">150</a>         assertTrue (certs != <strong 
class="jxr_keyword">null</strong> &amp;&amp; certs.length == 2);
+<a name="151" href="#151">151</a>     }
+<a name="152" href="#152">152</a>     
+<a name="153" href="#153">153</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="154" href="#154">154</a> <em class="jxr_javadoccomment">     * Test 
signing a SOAP message using a BST, sending the CA cert as well in the</em>
+<a name="155" href="#155">155</a> <em class="jxr_javadoccomment">     * 
message.</em>
+<a name="156" href="#156">156</a> <em class="jxr_javadoccomment">     */</em>
+<a name="157" href="#157">157</a>     @org.junit.Test
+<a name="158" href="#158">158</a>     <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
testSignatureDirectReferenceCACert() <strong 
class="jxr_keyword">throws</strong> Exception {
+<a name="159" href="#159">159</a>         WSSecSignature sign = <strong 
class="jxr_keyword">new</strong> WSSecSignature();
+<a name="160" href="#160">160</a>         sign.setUserInfo(<span 
class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>);
+<a name="161" href="#161">161</a>         
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
+<a name="162" href="#162">162</a>         sign.setUseSingleCertificate(false);
+<a name="163" href="#163">163</a> 
+<a name="164" href="#164">164</a>         Document doc = 
SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="165" href="#165">165</a> 
+<a name="166" href="#166">166</a>         WSSecHeader secHeader = <strong 
class="jxr_keyword">new</strong> WSSecHeader();
+<a name="167" href="#167">167</a>         secHeader.insertSecurityHeader(doc);
+<a name="168" href="#168">168</a>         Document signedDoc = sign.build(doc, 
crypto, secHeader);
+<a name="169" href="#169">169</a>         
+<a name="170" href="#170">170</a>         <strong 
class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="171" href="#171">171</a>             String outputString = 
+<a name="172" href="#172">172</a>                 
org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
+<a name="173" href="#173">173</a>             LOG.debug(<span 
class="jxr_string">"BST CA Cert"</span>);
+<a name="174" href="#174">174</a>             LOG.debug(outputString);
+<a name="175" href="#175">175</a>         }
+<a name="176" href="#176">176</a>         <em class="jxr_comment">//</em>
+<a name="177" href="#177">177</a>         <em class="jxr_comment">// Verify 
the signature</em>
+<a name="178" href="#178">178</a>         <em class="jxr_comment">//</em>
+<a name="179" href="#179">179</a>         List&lt;WSSecurityEngineResult&gt; 
results = verify(signedDoc, cryptoCA);
+<a name="180" href="#180">180</a>         WSSecurityEngineResult result = 
+<a name="181" href="#181">181</a>             
WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN);
+<a name="182" href="#182">182</a>         X509Certificate cert = 
+<a name="183" href="#183">183</a>             
(X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
+<a name="184" href="#184">184</a>         assertTrue (cert != <strong 
class="jxr_keyword">null</strong>);
+<a name="185" href="#185">185</a>         X509Certificate[] certs = 
+<a name="186" href="#186">186</a>             
(X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES);
+<a name="187" href="#187">187</a>         assertTrue (certs != <strong 
class="jxr_keyword">null</strong> &amp;&amp; certs.length == 2);
+<a name="188" href="#188">188</a>     }
+<a name="189" href="#189">189</a>     
+<a name="190" href="#190">190</a>     
+<a name="191" href="#191">191</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="192" href="#192">192</a> <em class="jxr_javadoccomment">     * Test 
signing a SOAP message using Issuer Serial. Note that this should fail, as 
the</em>
+<a name="193" href="#193">193</a> <em class="jxr_javadoccomment">     * 
trust-store does not contain the cert corresponding to wss40, only the CA 
cert</em>
+<a name="194" href="#194">194</a> <em class="jxr_javadoccomment">     * 
wss40CA.</em>
+<a name="195" href="#195">195</a> <em class="jxr_javadoccomment">     */</em>
+<a name="196" href="#196">196</a>     @org.junit.Test
+<a name="197" href="#197">197</a>     <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
testSignatureIssuerSerial() <strong class="jxr_keyword">throws</strong> 
Exception {
+<a name="198" href="#198">198</a>         WSSecSignature sign = <strong 
class="jxr_keyword">new</strong> WSSecSignature();
+<a name="199" href="#199">199</a>         sign.setUserInfo(<span 
class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>);
+<a name="200" href="#200">200</a>         
sign.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
+<a name="201" href="#201">201</a> 
+<a name="202" href="#202">202</a>         Document doc = 
SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="203" href="#203">203</a> 
+<a name="204" href="#204">204</a>         WSSecHeader secHeader = <strong 
class="jxr_keyword">new</strong> WSSecHeader();
+<a name="205" href="#205">205</a>         secHeader.insertSecurityHeader(doc);
+<a name="206" href="#206">206</a>         Document signedDoc = sign.build(doc, 
crypto, secHeader);
 <a name="207" href="#207">207</a>         
-<a name="208" href="#208">208</a>         <strong 
class="jxr_keyword">try</strong> {
-<a name="209" href="#209">209</a>             verify(signedDoc, cryptoCA);
-<a name="210" href="#210">210</a>             <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> 
Exception(<span class="jxr_string">"Failure expected on issuer serial"</span>);
-<a name="211" href="#211">211</a>         } <strong 
class="jxr_keyword">catch</strong> (WSSecurityException ex) {
-<a name="212" href="#212">212</a>             assertTrue(ex.getErrorCode() == 
WSSecurityException.FAILED_CHECK);
-<a name="213" href="#213">213</a>             <em class="jxr_comment">// 
expected</em>
-<a name="214" href="#214">214</a>         }
-<a name="215" href="#215">215</a>     }
-<a name="216" href="#216">216</a>     
-<a name="217" href="#217">217</a>     
-<a name="218" href="#218">218</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="219" href="#219">219</a> <em class="jxr_javadoccomment">     * Test 
signing a SOAP message using a BST. The signature verification passes, but the 
trust</em>
-<a name="220" href="#220">220</a> <em class="jxr_javadoccomment">     * 
verification will fail as the CA cert is out of date.</em>
-<a name="221" href="#221">221</a> <em class="jxr_javadoccomment">     */</em>
-<a name="222" href="#222">222</a>     @org.junit.Test
-<a name="223" href="#223">223</a>     <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
testSignatureBadCACert() <strong class="jxr_keyword">throws</strong> Exception {
-<a name="224" href="#224">224</a>         WSSecSignature sign = <strong 
class="jxr_keyword">new</strong> WSSecSignature();
-<a name="225" href="#225">225</a>         sign.setUserInfo(<span 
class="jxr_string">"wss4jcertdsa"</span>, <span 
class="jxr_string">"security"</span>);
-<a name="226" href="#226">226</a>         
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
-<a name="227" href="#227">227</a> 
-<a name="228" href="#228">228</a>         Document doc = 
SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="229" href="#229">229</a> 
-<a name="230" href="#230">230</a>         WSSecHeader secHeader = <strong 
class="jxr_keyword">new</strong> WSSecHeader();
-<a name="231" href="#231">231</a>         secHeader.insertSecurityHeader(doc);
-<a name="232" href="#232">232</a>         Document signedDoc = 
-<a name="233" href="#233">233</a>             sign.build(doc, 
CryptoFactory.getInstance(<span 
class="jxr_string">"wss40badca.properties"</span>), secHeader);
-<a name="234" href="#234">234</a>         
-<a name="235" href="#235">235</a>         <strong 
class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="236" href="#236">236</a>             String outputString = 
-<a name="237" href="#237">237</a>                 
org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
-<a name="238" href="#238">238</a>             LOG.debug(outputString);
-<a name="239" href="#239">239</a>         }
-<a name="240" href="#240">240</a>         <em class="jxr_comment">//</em>
-<a name="241" href="#241">241</a>         <em class="jxr_comment">// Verify 
the signature</em>
-<a name="242" href="#242">242</a>         <em class="jxr_comment">//</em>
-<a name="243" href="#243">243</a>         <strong 
class="jxr_keyword">try</strong> {
-<a name="244" href="#244">244</a>             verify(signedDoc, 
CryptoFactory.getInstance(<span 
class="jxr_string">"wss40badcatrust.properties"</span>));
-<a name="245" href="#245">245</a>             fail(<span 
class="jxr_string">"Failure expected on bad CA cert!"</span>);
-<a name="246" href="#246">246</a>         } <strong 
class="jxr_keyword">catch</strong> (WSSecurityException ex) {
-<a name="247" href="#247">247</a>             <em class="jxr_comment">// 
expected</em>
-<a name="248" href="#248">248</a>         }
-<a name="249" href="#249">249</a>     }
-<a name="250" href="#250">250</a>     
-<a name="251" href="#251">251</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="252" href="#252">252</a> <em class="jxr_javadoccomment">     * A test 
for "SignatureAction does not set DigestAlgorithm on WSSecSignature 
instance"</em>
-<a name="253" href="#253">253</a> <em class="jxr_javadoccomment">     */</em>
-<a name="254" href="#254">254</a>     @org.junit.Test
-<a name="255" href="#255">255</a>     <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
testMultipleCertsWSHandler() <strong class="jxr_keyword">throws</strong> 
Exception {
-<a name="256" href="#256">256</a>         <strong 
class="jxr_keyword">final</strong> WSSConfig cfg = WSSConfig.getNewInstance();
-<a name="257" href="#257">257</a>         <strong 
class="jxr_keyword">final</strong> <strong class="jxr_keyword">int</strong> 
action = WSConstants.SIGN;
-<a name="258" href="#258">258</a>         <strong 
class="jxr_keyword">final</strong> RequestData reqData = <strong 
class="jxr_keyword">new</strong> RequestData();
-<a name="259" href="#259">259</a>         reqData.setWssConfig(cfg);
-<a name="260" href="#260">260</a>         reqData.setUsername(<span 
class="jxr_string">"wss40"</span>);
-<a name="261" href="#261">261</a>         java.util.Map&lt;String, String&gt; 
config = <strong class="jxr_keyword">new</strong> java.util.TreeMap&lt;String, 
String&gt;();
-<a name="262" href="#262">262</a>         
config.put(WSHandlerConstants.SIG_PROP_FILE, <span 
class="jxr_string">"wss40.properties"</span>);
-<a name="263" href="#263">263</a>         config.put(<span 
class="jxr_string">"password"</span>, <span 
class="jxr_string">"security"</span>);
-<a name="264" href="#264">264</a>         
config.put(WSHandlerConstants.SIG_KEY_ID, <span 
class="jxr_string">"DirectReference"</span>);
-<a name="265" href="#265">265</a>         
config.put(WSHandlerConstants.USE_SINGLE_CERTIFICATE, <span 
class="jxr_string">"false"</span>);
-<a name="266" href="#266">266</a>         reqData.setMsgContext(config);
-<a name="267" href="#267">267</a>         
-<a name="268" href="#268">268</a>         <strong 
class="jxr_keyword">final</strong> java.util.List&lt;Integer&gt; actions = 
<strong class="jxr_keyword">new</strong> java.util.ArrayList&lt;Integer&gt;();
-<a name="269" href="#269">269</a>         actions.add(<strong 
class="jxr_keyword">new</strong> Integer(action));
-<a name="270" href="#270">270</a>         <strong 
class="jxr_keyword">final</strong> Document doc = 
SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
-<a name="271" href="#271">271</a>         <a 
href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a>
 handler = <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a>();
-<a name="272" href="#272">272</a>         handler.send(
-<a name="273" href="#273">273</a>             action, 
-<a name="274" href="#274">274</a>             doc, 
-<a name="275" href="#275">275</a>             reqData, 
-<a name="276" href="#276">276</a>             actions,
-<a name="277" href="#277">277</a>             <strong 
class="jxr_keyword">true</strong>
-<a name="278" href="#278">278</a>         );
-<a name="279" href="#279">279</a>         
-<a name="280" href="#280">280</a>         <em class="jxr_comment">//</em>
-<a name="281" href="#281">281</a>         <em class="jxr_comment">// Verify 
the signature</em>
-<a name="282" href="#282">282</a>         <em class="jxr_comment">//</em>
-<a name="283" href="#283">283</a>         List&lt;WSSecurityEngineResult&gt; 
results = verify(doc, cryptoCA);
-<a name="284" href="#284">284</a>         WSSecurityEngineResult result = 
-<a name="285" href="#285">285</a>             
WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN);
-<a name="286" href="#286">286</a>         X509Certificate cert = 
-<a name="287" href="#287">287</a>             
(X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
-<a name="288" href="#288">288</a>         assertTrue (cert != <strong 
class="jxr_keyword">null</strong>);
-<a name="289" href="#289">289</a>         X509Certificate[] certs = 
-<a name="290" href="#290">290</a>             
(X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES);
-<a name="291" href="#291">291</a>         assertTrue (certs != <strong 
class="jxr_keyword">null</strong> &amp;&amp; certs.length == 2);
-<a name="292" href="#292">292</a>     }
-<a name="293" href="#293">293</a>     
-<a name="294" href="#294">294</a>     
-<a name="295" href="#295">295</a>     <em class="jxr_javadoccomment">/**</em>
-<a name="296" href="#296">296</a> <em class="jxr_javadoccomment">     * 
Verifies the soap envelope</em>
-<a name="297" href="#297">297</a> <em class="jxr_javadoccomment">     * 
&lt;p/&gt;</em>
-<a name="298" href="#298">298</a> <em class="jxr_javadoccomment">     * </em>
-<a name="299" href="#299">299</a> <em class="jxr_javadoccomment">     * @param 
doc </em>
-<a name="300" href="#300">300</a> <em class="jxr_javadoccomment">     * 
@throws Exception Thrown when there is a problem in verification</em>
-<a name="301" href="#301">301</a> <em class="jxr_javadoccomment">     */</em>
-<a name="302" href="#302">302</a>     <strong 
class="jxr_keyword">private</strong> List&lt;WSSecurityEngineResult&gt; 
-<a name="303" href="#303">303</a>     verify(Document doc, Crypto crypto) 
<strong class="jxr_keyword">throws</strong> WSSecurityException {
-<a name="304" href="#304">304</a>         List&lt;WSSecurityEngineResult&gt; 
results = secEngine.processSecurityHeader(
-<a name="305" href="#305">305</a>             doc, <strong 
class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, 
crypto
-<a name="306" href="#306">306</a>         );
-<a name="307" href="#307">307</a>         <strong 
class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
-<a name="308" href="#308">308</a>             LOG.debug(<span 
class="jxr_string">"Verfied and decrypted message:"</span>);
-<a name="309" href="#309">309</a>             String outputString = 
-<a name="310" href="#310">310</a>                 
org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
-<a name="311" href="#311">311</a>             LOG.debug(outputString);
-<a name="312" href="#312">312</a>         }
-<a name="313" href="#313">313</a>         <strong 
class="jxr_keyword">return</strong> results;
-<a name="314" href="#314">314</a>     }
-<a name="315" href="#315">315</a> 
-<a name="316" href="#316">316</a>     
-<a name="317" href="#317">317</a> }
+<a name="208" href="#208">208</a>         <strong 
class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="209" href="#209">209</a>             String outputString = 
+<a name="210" href="#210">210</a>                 
org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
+<a name="211" href="#211">211</a>             LOG.debug(outputString);
+<a name="212" href="#212">212</a>         }
+<a name="213" href="#213">213</a>         
+<a name="214" href="#214">214</a>         <strong 
class="jxr_keyword">try</strong> {
+<a name="215" href="#215">215</a>             verify(signedDoc, cryptoCA);
+<a name="216" href="#216">216</a>             <strong 
class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> 
Exception(<span class="jxr_string">"Failure expected on issuer serial"</span>);
+<a name="217" href="#217">217</a>         } <strong 
class="jxr_keyword">catch</strong> (WSSecurityException ex) {
+<a name="218" href="#218">218</a>             assertTrue(ex.getErrorCode() == 
WSSecurityException.FAILED_CHECK);
+<a name="219" href="#219">219</a>             <em class="jxr_comment">// 
expected</em>
+<a name="220" href="#220">220</a>         }
+<a name="221" href="#221">221</a>     }
+<a name="222" href="#222">222</a>     
+<a name="223" href="#223">223</a>     
+<a name="224" href="#224">224</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="225" href="#225">225</a> <em class="jxr_javadoccomment">     * Test 
signing a SOAP message using a BST. The signature verification passes, but the 
trust</em>
+<a name="226" href="#226">226</a> <em class="jxr_javadoccomment">     * 
verification will fail as the CA cert is out of date.</em>
+<a name="227" href="#227">227</a> <em class="jxr_javadoccomment">     */</em>
+<a name="228" href="#228">228</a>     @org.junit.Test
+<a name="229" href="#229">229</a>     <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
testSignatureBadCACert() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="230" href="#230">230</a>         WSSecSignature sign = <strong 
class="jxr_keyword">new</strong> WSSecSignature();
+<a name="231" href="#231">231</a>         sign.setUserInfo(<span 
class="jxr_string">"wss4jcertdsa"</span>, <span 
class="jxr_string">"security"</span>);
+<a name="232" href="#232">232</a>         
sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
+<a name="233" href="#233">233</a> 
+<a name="234" href="#234">234</a>         Document doc = 
SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="235" href="#235">235</a> 
+<a name="236" href="#236">236</a>         WSSecHeader secHeader = <strong 
class="jxr_keyword">new</strong> WSSecHeader();
+<a name="237" href="#237">237</a>         secHeader.insertSecurityHeader(doc);
+<a name="238" href="#238">238</a>         Document signedDoc = 
+<a name="239" href="#239">239</a>             sign.build(doc, 
CryptoFactory.getInstance(<span 
class="jxr_string">"wss40badca.properties"</span>), secHeader);
+<a name="240" href="#240">240</a>         
+<a name="241" href="#241">241</a>         <strong 
class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="242" href="#242">242</a>             String outputString = 
+<a name="243" href="#243">243</a>                 
org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
+<a name="244" href="#244">244</a>             LOG.debug(outputString);
+<a name="245" href="#245">245</a>         }
+<a name="246" href="#246">246</a>         <em class="jxr_comment">//</em>
+<a name="247" href="#247">247</a>         <em class="jxr_comment">// Verify 
the signature</em>
+<a name="248" href="#248">248</a>         <em class="jxr_comment">//</em>
+<a name="249" href="#249">249</a>         <strong 
class="jxr_keyword">try</strong> {
+<a name="250" href="#250">250</a>             verify(signedDoc, 
CryptoFactory.getInstance(<span 
class="jxr_string">"wss40badcatrust.properties"</span>));
+<a name="251" href="#251">251</a>             fail(<span 
class="jxr_string">"Failure expected on bad CA cert!"</span>);
+<a name="252" href="#252">252</a>         } <strong 
class="jxr_keyword">catch</strong> (WSSecurityException ex) {
+<a name="253" href="#253">253</a>             <em class="jxr_comment">// 
expected</em>
+<a name="254" href="#254">254</a>         }
+<a name="255" href="#255">255</a>     }
+<a name="256" href="#256">256</a>     
+<a name="257" href="#257">257</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="258" href="#258">258</a> <em class="jxr_javadoccomment">     * A test 
for "SignatureAction does not set DigestAlgorithm on WSSecSignature 
instance"</em>
+<a name="259" href="#259">259</a> <em class="jxr_javadoccomment">     */</em>
+<a name="260" href="#260">260</a>     @org.junit.Test
+<a name="261" href="#261">261</a>     <strong 
class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> 
testMultipleCertsWSHandler() <strong class="jxr_keyword">throws</strong> 
Exception {
+<a name="262" href="#262">262</a>         <strong 
class="jxr_keyword">final</strong> WSSConfig cfg = WSSConfig.getNewInstance();
+<a name="263" href="#263">263</a>         <strong 
class="jxr_keyword">final</strong> <strong class="jxr_keyword">int</strong> 
action = WSConstants.SIGN;
+<a name="264" href="#264">264</a>         <strong 
class="jxr_keyword">final</strong> RequestData reqData = <strong 
class="jxr_keyword">new</strong> RequestData();
+<a name="265" href="#265">265</a>         reqData.setWssConfig(cfg);
+<a name="266" href="#266">266</a>         reqData.setUsername(<span 
class="jxr_string">"wss40"</span>);
+<a name="267" href="#267">267</a>         java.util.Map&lt;String, String&gt; 
config = <strong class="jxr_keyword">new</strong> java.util.TreeMap&lt;String, 
String&gt;();
+<a name="268" href="#268">268</a>         
config.put(WSHandlerConstants.SIG_PROP_FILE, <span 
class="jxr_string">"wss40.properties"</span>);
+<a name="269" href="#269">269</a>         config.put(<span 
class="jxr_string">"password"</span>, <span 
class="jxr_string">"security"</span>);
+<a name="270" href="#270">270</a>         
config.put(WSHandlerConstants.SIG_KEY_ID, <span 
class="jxr_string">"DirectReference"</span>);
+<a name="271" href="#271">271</a>         
config.put(WSHandlerConstants.USE_SINGLE_CERTIFICATE, <span 
class="jxr_string">"false"</span>);
+<a name="272" href="#272">272</a>         reqData.setMsgContext(config);
+<a name="273" href="#273">273</a>         
+<a name="274" href="#274">274</a>         <strong 
class="jxr_keyword">final</strong> java.util.List&lt;Integer&gt; actions = 
<strong class="jxr_keyword">new</strong> java.util.ArrayList&lt;Integer&gt;();
+<a name="275" href="#275">275</a>         actions.add(<strong 
class="jxr_keyword">new</strong> Integer(action));
+<a name="276" href="#276">276</a>         <strong 
class="jxr_keyword">final</strong> Document doc = 
SOAPUtil.toSOAPPart(SOAPUtil.SAMPLE_SOAP_MSG);
+<a name="277" href="#277">277</a>         <a 
href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a>
 handler = <strong class="jxr_keyword">new</strong> <a 
href="../../../../../org/apache/ws/security/common/CustomHandler.html">CustomHandler</a>();
+<a name="278" href="#278">278</a>         handler.send(
+<a name="279" href="#279">279</a>             action, 
+<a name="280" href="#280">280</a>             doc, 
+<a name="281" href="#281">281</a>             reqData, 
+<a name="282" href="#282">282</a>             actions,
+<a name="283" href="#283">283</a>             <strong 
class="jxr_keyword">true</strong>
+<a name="284" href="#284">284</a>         );
+<a name="285" href="#285">285</a>         
+<a name="286" href="#286">286</a>         <em class="jxr_comment">//</em>
+<a name="287" href="#287">287</a>         <em class="jxr_comment">// Verify 
the signature</em>
+<a name="288" href="#288">288</a>         <em class="jxr_comment">//</em>
+<a name="289" href="#289">289</a>         List&lt;WSSecurityEngineResult&gt; 
results = verify(doc, cryptoCA);
+<a name="290" href="#290">290</a>         WSSecurityEngineResult result = 
+<a name="291" href="#291">291</a>             
WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN);
+<a name="292" href="#292">292</a>         X509Certificate cert = 
+<a name="293" href="#293">293</a>             
(X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
+<a name="294" href="#294">294</a>         assertTrue (cert != <strong 
class="jxr_keyword">null</strong>);
+<a name="295" href="#295">295</a>         X509Certificate[] certs = 
+<a name="296" href="#296">296</a>             
(X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES);
+<a name="297" href="#297">297</a>         assertTrue (certs != <strong 
class="jxr_keyword">null</strong> &amp;&amp; certs.length == 2);
+<a name="298" href="#298">298</a>     }
+<a name="299" href="#299">299</a>     
+<a name="300" href="#300">300</a>     
+<a name="301" href="#301">301</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="302" href="#302">302</a> <em class="jxr_javadoccomment">     * 
Verifies the soap envelope</em>
+<a name="303" href="#303">303</a> <em class="jxr_javadoccomment">     * 
&lt;p/&gt;</em>
+<a name="304" href="#304">304</a> <em class="jxr_javadoccomment">     * </em>
+<a name="305" href="#305">305</a> <em class="jxr_javadoccomment">     * @param 
doc </em>
+<a name="306" href="#306">306</a> <em class="jxr_javadoccomment">     * 
@throws Exception Thrown when there is a problem in verification</em>
+<a name="307" href="#307">307</a> <em class="jxr_javadoccomment">     */</em>
+<a name="308" href="#308">308</a>     <strong 
class="jxr_keyword">private</strong> List&lt;WSSecurityEngineResult&gt; 
+<a name="309" href="#309">309</a>     verify(Document doc, Crypto crypto) 
<strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="310" href="#310">310</a>         List&lt;WSSecurityEngineResult&gt; 
results = secEngine.processSecurityHeader(
+<a name="311" href="#311">311</a>             doc, <strong 
class="jxr_keyword">null</strong>, <strong class="jxr_keyword">null</strong>, 
crypto
+<a name="312" href="#312">312</a>         );
+<a name="313" href="#313">313</a>         <strong 
class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="314" href="#314">314</a>             LOG.debug(<span 
class="jxr_string">"Verfied and decrypted message:"</span>);
+<a name="315" href="#315">315</a>             String outputString = 
+<a name="316" href="#316">316</a>                 
org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
+<a name="317" href="#317">317</a>             LOG.debug(outputString);
+<a name="318" href="#318">318</a>         }
+<a name="319" href="#319">319</a>         <strong 
class="jxr_keyword">return</strong> results;
+<a name="320" href="#320">320</a>     }
+<a name="321" href="#321">321</a> 
+<a name="322" href="#322">322</a>     
+<a name="323" href="#323">323</a> }
 </pre>
 <hr/><div id="footer">This page was automatically generated by <a 
href="http://maven.apache.org/";>Maven</a></div></body>
 </html>


Reply via email to