Signature coverage of signed XML Encryption elements created using standard
WSS4J elements cannot be verified with WS-SP configuration or the
CryptoCoverageChecker
-------------------------------------------------------------------------------------------------------------------------------------------------------------------
Key: CXF-2963
URL: https://issues.apache.org/jira/browse/CXF-2963
Project: CXF
Issue Type: Bug
Components: WS-* Components
Affects Versions: 2.2.10, 2.3
Reporter: David Valeri
Priority: Minor
When using manual configuration of WSS4J on the client outbound interceptor
chain, the resulting message contains extraneous Id attributes on the signed
XML Encryption elements. The signature is computed using a different attribute
value than that reported by the encryption results from WSS4J on the server
side.
For instance, the following signed element is referenced in different ways:
<xenc:EncryptedData
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Id="EncDataId-659"
Type="http://www.w3.org/2001/04/xmlenc#Element" wsu:Id="id-663">
Signature: <ds:Reference URI="#id-663">
Encryption: <xenc:DataReference URI="#EncDataId-659" />
The extra ID invalidates the XML Encryption schema and troubles the logic that
determines signed encrypted content.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.