[
https://issues.apache.org/jira/browse/CXF-6582?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14907906#comment-14907906
]
Colm O hEigeartaigh commented on CXF-6582:
------------------------------------------
There are a number of different issues here. I just fixed the first one, which
is that for WS-SecurityPolicy 1.1 the algorithms specified as
(a)symmetric.signature.algorithm in config weren't overriding the default
value. So I suspect now that if you use Basic256Sha256 locally for the
TransportBinding AlgorithmSuite it should work.
The other issue is that the TransportBinding AlgorithmSuite policy is being
used to verify signature/encryption algorithms. I'm going to have a think about
how feasible it is to change this...
Colm.
> Support newer symmetric signature algorithms with WS-SecurityPolicy
> -------------------------------------------------------------------
>
> Key: CXF-6582
> URL: https://issues.apache.org/jira/browse/CXF-6582
> Project: CXF
> Issue Type: Bug
> Reporter: Colm O hEigeartaigh
> Assignee: Colm O hEigeartaigh
> Fix For: 3.1.3, 3.0.7
>
> Attachments: req-3.1.3.xml, response-plain.xml, response.xml
>
>
> This task is to support using symmetric signature algorithms other than the
> default (HMAC-SHA1) with WS-SecurityPolicy.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)