[ 
https://issues.apache.org/jira/browse/CXF-6582?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14907906#comment-14907906
 ] 

Colm O hEigeartaigh commented on CXF-6582:
------------------------------------------


There are a number of different issues here. I just fixed the first one, which 
is that for WS-SecurityPolicy 1.1 the algorithms specified as 
(a)symmetric.signature.algorithm in config weren't overriding the default 
value. So I suspect now that if you use Basic256Sha256 locally for the 
TransportBinding AlgorithmSuite it should work.

The other issue is that the TransportBinding AlgorithmSuite policy is being 
used to verify signature/encryption algorithms. I'm going to have a think about 
how feasible it is to change this...

Colm.

> Support newer symmetric signature algorithms with WS-SecurityPolicy
> -------------------------------------------------------------------
>
>                 Key: CXF-6582
>                 URL: https://issues.apache.org/jira/browse/CXF-6582
>             Project: CXF
>          Issue Type: Bug
>            Reporter: Colm O hEigeartaigh
>            Assignee: Colm O hEigeartaigh
>             Fix For: 3.1.3, 3.0.7
>
>         Attachments: req-3.1.3.xml, response-plain.xml, response.xml
>
>
> This task is to support using symmetric signature algorithms other than the 
> default (HMAC-SHA1) with WS-SecurityPolicy.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to