http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java index df86a11..06d6d82 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxSymmetricBindingHandler.java @@ -66,6 +66,7 @@ import org.apache.xml.security.exceptions.XMLSecurityException; import org.apache.xml.security.stax.ext.OutboundSecurityContext; import org.apache.xml.security.stax.ext.SecurePart; import org.apache.xml.security.stax.ext.SecurePart.Modifier; +import org.apache.xml.security.stax.ext.XMLSecurityConstants; import org.apache.xml.security.stax.impl.util.IDGenerator; import org.apache.xml.security.stax.securityEvent.AbstractSecuredElementSecurityEvent; import org.apache.xml.security.stax.securityEvent.SecurityEvent; @@ -235,7 +236,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { //Check for signature protection if (sbinding.isEncryptSignature()) { SecurePart part = - new SecurePart(new QName(WSSConstants.NS_DSIG, "Signature"), Modifier.Element); + new SecurePart(new QName(XMLSecurityConstants.NS_DSIG, "Signature"), Modifier.Element); encrParts.add(part); if (signatureConfirmationAdded) { part = new SecurePart(WSSConstants.TAG_WSSE11_SIG_CONF, Modifier.Element); @@ -373,7 +374,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { //Check for signature protection if (sbinding.isEncryptSignature()) { SecurePart part = - new SecurePart(new QName(WSSConstants.NS_DSIG, "Signature"), Modifier.Element); + new SecurePart(new QName(XMLSecurityConstants.NS_DSIG, "Signature"), Modifier.Element); enc.add(part); if (signatureConfirmationAdded) { part = new SecurePart(WSSConstants.TAG_WSSE11_SIG_CONF, Modifier.Element); @@ -406,7 +407,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { // Action WSSSecurityProperties properties = getProperties(); - WSSConstants.Action actionToPerform = WSSConstants.ENCRYPT; + WSSConstants.Action actionToPerform = XMLSecurityConstants.ENCRYPT; if (recToken.getToken().getDerivedKeys() == DerivedKeys.RequireDerivedKeys) { actionToPerform = WSSConstants.ENCRYPT_WITH_DERIVED_KEY; if (MessageUtils.isRequestor(message) && recToken.getToken() instanceof X509Token) { @@ -506,7 +507,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { // Action WSSSecurityProperties properties = getProperties(); - WSSConstants.Action actionToPerform = WSSConstants.SIGNATURE; + WSSConstants.Action actionToPerform = XMLSecurityConstants.SIGNATURE; if (wrapper.getToken().getDerivedKeys() == DerivedKeys.RequireDerivedKeys) { actionToPerform = WSSConstants.SIGNATURE_WITH_DERIVED_KEY; if (MessageUtils.isRequestor(message) && policyToken instanceof X509Token) { @@ -545,7 +546,7 @@ public class StaxSymmetricBindingHandler extends AbstractStaxBindingHandler { AbstractToken sigToken = wrapper.getToken(); if (sbinding.isProtectTokens() && sigToken instanceof X509Token && isRequestor()) { SecurePart securePart = - new SecurePart(new QName(WSSConstants.NS_XMLENC, "EncryptedKey"), Modifier.Element); + new SecurePart(new QName(XMLSecurityConstants.NS_XMLENC, "EncryptedKey"), Modifier.Element); properties.addSignaturePart(securePart); }
http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxTransportBindingHandler.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxTransportBindingHandler.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxTransportBindingHandler.java index ff71d2f..5ea70ad 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxTransportBindingHandler.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/StaxTransportBindingHandler.java @@ -64,6 +64,7 @@ import org.apache.wss4j.stax.ext.WSSSecurityProperties; import org.apache.xml.security.stax.ext.OutboundSecurityContext; import org.apache.xml.security.stax.ext.SecurePart; import org.apache.xml.security.stax.ext.SecurePart.Modifier; +import org.apache.xml.security.stax.ext.XMLSecurityConstants; /** * @@ -355,7 +356,7 @@ public class StaxTransportBindingHandler extends AbstractStaxBindingHandler { throw new Exception("Endorsing UsernameTokens are not supported in the streaming code"); } else if (token instanceof KerberosToken) { WSSSecurityProperties properties = getProperties(); - properties.addAction(WSSConstants.SIGNATURE); + properties.addAction(XMLSecurityConstants.SIGNATURE); configureSignature(token, false); addKerberosToken((KerberosToken)token, false, true, false); @@ -377,7 +378,7 @@ public class StaxTransportBindingHandler extends AbstractStaxBindingHandler { // Action WSSSecurityProperties properties = getProperties(); - WSSConstants.Action actionToPerform = WSSConstants.SIGNATURE; + WSSConstants.Action actionToPerform = XMLSecurityConstants.SIGNATURE; if (token.getDerivedKeys() == DerivedKeys.RequireDerivedKeys) { actionToPerform = WSSConstants.SIGNATURE_WITH_DERIVED_KEY; } http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/SymmetricBindingHandler.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/SymmetricBindingHandler.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/SymmetricBindingHandler.java index cfdd3f6..1f12598 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/SymmetricBindingHandler.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/SymmetricBindingHandler.java @@ -46,6 +46,7 @@ import org.apache.cxf.ws.security.wss4j.AttachmentCallbackHandler; import org.apache.cxf.ws.security.wss4j.StaxSerializer; import org.apache.cxf.ws.security.wss4j.WSS4JUtils; import org.apache.wss4j.common.WSEncryptionPart; +import org.apache.wss4j.common.WSS4JConstants; import org.apache.wss4j.common.bsp.BSPEnforcer; import org.apache.wss4j.common.crypto.Crypto; import org.apache.wss4j.common.derivedKey.ConversationConstants; @@ -428,14 +429,14 @@ public class SymmetricBindingHandler extends AbstractBindingBuilder { SecurityTokenReference tokenRef = new SecurityTokenReference(saaj.getSOAPPart()); String tokenType = encrTok.getTokenType(); if (encrToken instanceof KerberosToken) { - tokenRef.setKeyIdentifier(WSConstants.WSS_KRB_KI_VALUE_TYPE, encrTok.getSHA1(), true); + tokenRef.setKeyIdentifier(WSS4JConstants.WSS_KRB_KI_VALUE_TYPE, encrTok.getSHA1(), true); if (tokenType == null) { - tokenType = WSConstants.WSS_GSS_KRB_V5_AP_REQ; + tokenType = WSS4JConstants.WSS_GSS_KRB_V5_AP_REQ; } } else { tokenRef.setKeyIdentifierEncKeySHA1(encrTok.getSHA1()); if (tokenType == null) { - tokenType = WSConstants.WSS_ENC_KEY_VALUE_TYPE; + tokenType = WSS4JConstants.WSS_ENC_KEY_VALUE_TYPE; } } tokenRef.addTokenType(tokenType); @@ -464,21 +465,21 @@ public class SymmetricBindingHandler extends AbstractBindingBuilder { if (encrTok.getSHA1() != null) { String tokenType = encrTok.getTokenType(); if (tokenType == null) { - tokenType = WSConstants.WSS_ENC_KEY_VALUE_TYPE; + tokenType = WSS4JConstants.WSS_ENC_KEY_VALUE_TYPE; } dkEncr.setCustomValueType(tokenType); } else { String tokenType = encrTok.getTokenType(); - if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) - || WSConstants.SAML_NS.equals(tokenType)) { + if (WSS4JConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) + || WSS4JConstants.SAML_NS.equals(tokenType)) { dkEncr.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); - dkEncr.setCustomValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); - } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) - || WSConstants.SAML2_NS.equals(tokenType)) { + dkEncr.setCustomValueType(WSS4JConstants.WSS_SAML_KI_VALUE_TYPE); + } else if (WSS4JConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) + || WSS4JConstants.SAML2_NS.equals(tokenType)) { dkEncr.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); - dkEncr.setCustomValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); + dkEncr.setCustomValueType(WSS4JConstants.WSS_SAML2_KI_VALUE_TYPE); } else if (encrToken instanceof UsernameToken) { - dkEncr.setCustomValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); + dkEncr.setCustomValueType(WSS4JConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); } else { dkEncr.setCustomValueType(tokenType); } @@ -575,22 +576,22 @@ public class SymmetricBindingHandler extends AbstractBindingBuilder { SecurityTokenReference secRef = new SecurityTokenReference(cloneElement(ref), new BSPEnforcer()); encr.setSecurityTokenReference(secRef); - } else if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) - || WSConstants.SAML_NS.equals(tokenType)) { - encr.setCustomReferenceValue(WSConstants.WSS_SAML_KI_VALUE_TYPE); + } else if (WSS4JConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) + || WSS4JConstants.SAML_NS.equals(tokenType)) { + encr.setCustomReferenceValue(WSS4JConstants.WSS_SAML_KI_VALUE_TYPE); encr.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); - } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) - || WSConstants.SAML2_NS.equals(tokenType)) { - encr.setCustomReferenceValue(WSConstants.WSS_SAML2_KI_VALUE_TYPE); + } else if (WSS4JConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) + || WSS4JConstants.SAML2_NS.equals(tokenType)) { + encr.setCustomReferenceValue(WSS4JConstants.WSS_SAML2_KI_VALUE_TYPE); encr.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { encr.setCustomReferenceValue(tokenType); encr.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } } else if (encrToken instanceof UsernameToken) { - encr.setCustomReferenceValue(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); + encr.setCustomReferenceValue(WSS4JConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); } else if (encrToken instanceof KerberosToken && !isRequestor()) { - encr.setCustomReferenceValue(WSConstants.WSS_KRB_KI_VALUE_TYPE); + encr.setCustomReferenceValue(WSS4JConstants.WSS_KRB_KI_VALUE_TYPE); encr.setEncKeyId(encrTok.getSHA1()); } else if (!isRequestor() && encrTok.getSHA1() != null) { encr.setCustomReferenceValue(encrTok.getSHA1()); @@ -680,14 +681,14 @@ public class SymmetricBindingHandler extends AbstractBindingBuilder { if (tok.getSHA1() != null) { String tokenType = tok.getTokenType(); if (policyToken instanceof KerberosToken) { - tokenRef.setKeyIdentifier(WSConstants.WSS_KRB_KI_VALUE_TYPE, tok.getSHA1(), true); + tokenRef.setKeyIdentifier(WSS4JConstants.WSS_KRB_KI_VALUE_TYPE, tok.getSHA1(), true); if (tokenType == null) { - tokenType = WSConstants.WSS_GSS_KRB_V5_AP_REQ; + tokenType = WSS4JConstants.WSS_GSS_KRB_V5_AP_REQ; } } else { tokenRef.setKeyIdentifierEncKeySHA1(tok.getSHA1()); if (tokenType == null) { - tokenType = WSConstants.WSS_ENC_KEY_VALUE_TYPE; + tokenType = WSS4JConstants.WSS_ENC_KEY_VALUE_TYPE; } } tokenRef.addTokenType(tokenType); @@ -718,21 +719,21 @@ public class SymmetricBindingHandler extends AbstractBindingBuilder { //Set the value type of the reference String tokenType = tok.getTokenType(); if (tokenType == null) { - tokenType = WSConstants.WSS_ENC_KEY_VALUE_TYPE; + tokenType = WSS4JConstants.WSS_ENC_KEY_VALUE_TYPE; } dkSign.setCustomValueType(tokenType); } else { String tokenType = tok.getTokenType(); - if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) - || WSConstants.SAML_NS.equals(tokenType)) { + if (WSS4JConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) + || WSS4JConstants.SAML_NS.equals(tokenType)) { dkSign.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); - dkSign.setCustomValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); - } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) - || WSConstants.SAML2_NS.equals(tokenType)) { + dkSign.setCustomValueType(WSS4JConstants.WSS_SAML_KI_VALUE_TYPE); + } else if (WSS4JConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) + || WSS4JConstants.SAML2_NS.equals(tokenType)) { dkSign.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); - dkSign.setCustomValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); + dkSign.setCustomValueType(WSS4JConstants.WSS_SAML2_KI_VALUE_TYPE); } else if (policyToken instanceof UsernameToken) { - dkSign.setCustomValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); + dkSign.setCustomValueType(WSS4JConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); } else { dkSign.setCustomValueType(tokenType); } @@ -801,7 +802,7 @@ public class SymmetricBindingHandler extends AbstractBindingBuilder { if (policyToken instanceof X509Token) { if (isRequestor()) { sig.setCustomTokenValueType( - WSConstants.SOAPMESSAGE_NS11 + "#" + WSConstants.ENC_KEY_VALUE_TYPE + WSS4JConstants.SOAPMESSAGE_NS11 + "#" + WSS4JConstants.ENC_KEY_VALUE_TYPE ); sig.setKeyIdentifierType(type); } else { @@ -810,14 +811,14 @@ public class SymmetricBindingHandler extends AbstractBindingBuilder { sig.setKeyIdentifierType(WSConstants.ENCRYPTED_KEY_SHA1_IDENTIFIER); } } else if (policyToken instanceof UsernameToken) { - sig.setCustomTokenValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); + sig.setCustomTokenValueType(WSS4JConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); sig.setKeyIdentifierType(type); } else if (policyToken instanceof KerberosToken) { if (isRequestor()) { sig.setCustomTokenValueType(tok.getTokenType()); sig.setKeyIdentifierType(type); } else { - sig.setCustomTokenValueType(WSConstants.WSS_KRB_KI_VALUE_TYPE); + sig.setCustomTokenValueType(WSS4JConstants.WSS_KRB_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); sigTokId = tok.getSHA1(); } @@ -837,13 +838,13 @@ public class SymmetricBindingHandler extends AbstractBindingBuilder { sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { String tokenType = tok.getTokenType(); - if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) - || WSConstants.SAML_NS.equals(tokenType)) { - sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); + if (WSS4JConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) + || WSS4JConstants.SAML_NS.equals(tokenType)) { + sig.setCustomTokenValueType(WSS4JConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); - } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) - || WSConstants.SAML2_NS.equals(tokenType)) { - sig.setCustomTokenValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); + } else if (WSS4JConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) + || WSS4JConstants.SAML2_NS.equals(tokenType)) { + sig.setCustomTokenValueType(WSS4JConstants.WSS_SAML2_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { sig.setCustomTokenValueType(tokenType); http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/TransportBindingHandler.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/TransportBindingHandler.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/TransportBindingHandler.java index 937cb22..776c2ec 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/TransportBindingHandler.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyhandlers/TransportBindingHandler.java @@ -41,6 +41,7 @@ import org.apache.cxf.ws.security.tokenstore.SecurityToken; import org.apache.cxf.ws.security.wss4j.AttachmentCallbackHandler; import org.apache.cxf.ws.security.wss4j.WSS4JUtils; import org.apache.wss4j.common.WSEncryptionPart; +import org.apache.wss4j.common.WSS4JConstants; import org.apache.wss4j.common.bsp.BSPEnforcer; import org.apache.wss4j.common.crypto.Crypto; import org.apache.wss4j.common.derivedKey.ConversationConstants; @@ -481,7 +482,7 @@ public class TransportBindingHandler extends AbstractBindingBuilder { } if (token instanceof UsernameToken) { - dkSign.setCustomValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); + dkSign.setCustomValueType(WSS4JConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); } // Set the algo info @@ -534,12 +535,12 @@ public class TransportBindingHandler extends AbstractBindingBuilder { sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else if (token instanceof UsernameToken) { sig.setCustomTokenId(secTok.getId()); - sig.setCustomTokenValueType(WSConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); + sig.setCustomTokenValueType(WSS4JConstants.WSS_USERNAME_TOKEN_VALUE_TYPE); int type = tokenIncluded ? WSConstants.CUSTOM_SYMM_SIGNING : WSConstants.CUSTOM_SYMM_SIGNING_DIRECT; sig.setKeyIdentifierType(type); } else if (secTok.getTokenType() == null) { - sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); + sig.setCustomTokenValueType(WSS4JConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { String id = secTok.getWsuId(); @@ -551,13 +552,13 @@ public class TransportBindingHandler extends AbstractBindingBuilder { sig.setKeyIdentifierType(WSConstants.CUSTOM_SYMM_SIGNING); } String tokenType = secTok.getTokenType(); - if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) - || WSConstants.SAML_NS.equals(tokenType)) { - sig.setCustomTokenValueType(WSConstants.WSS_SAML_KI_VALUE_TYPE); + if (WSS4JConstants.WSS_SAML_TOKEN_TYPE.equals(tokenType) + || WSS4JConstants.SAML_NS.equals(tokenType)) { + sig.setCustomTokenValueType(WSS4JConstants.WSS_SAML_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); - } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) - || WSConstants.SAML2_NS.equals(tokenType)) { - sig.setCustomTokenValueType(WSConstants.WSS_SAML2_KI_VALUE_TYPE); + } else if (WSS4JConstants.WSS_SAML2_TOKEN_TYPE.equals(tokenType) + || WSS4JConstants.SAML2_NS.equals(tokenType)) { + sig.setCustomTokenValueType(WSS4JConstants.WSS_SAML2_KI_VALUE_TYPE); sig.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER); } else { sig.setCustomTokenValueType(tokenType); @@ -627,7 +628,7 @@ public class TransportBindingHandler extends AbstractBindingBuilder { // Add timestamp if (timestampEl != null) { WSEncryptionPart timestampPart = - new WSEncryptionPart("Timestamp", WSConstants.WSU_NS, "Element"); + new WSEncryptionPart("Timestamp", WSS4JConstants.WSU_NS, "Element"); String id = addWsuIdToElement(timestampEl.getElement()); timestampPart.setId(id); timestampPart.setElement(timestampEl.getElement()); http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AbstractSupportingTokenPolicyValidator.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AbstractSupportingTokenPolicyValidator.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AbstractSupportingTokenPolicyValidator.java index 3c2a78f..0b5887a 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AbstractSupportingTokenPolicyValidator.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AbstractSupportingTokenPolicyValidator.java @@ -47,6 +47,7 @@ import org.apache.cxf.message.Message; import org.apache.cxf.security.transport.TLSSessionInfo; import org.apache.cxf.ws.policy.AssertionInfo; import org.apache.cxf.ws.policy.AssertionInfoMap; +import org.apache.wss4j.common.WSS4JConstants; import org.apache.wss4j.common.saml.SAMLKeyInfo; import org.apache.wss4j.common.saml.SamlAssertionWrapper; import org.apache.wss4j.common.token.BinarySecurity; @@ -797,7 +798,7 @@ public abstract class AbstractSupportingTokenPolicyValidator extends AbstractSec List<WSSecurityEngineResult> encryptedResults) { if (signedRef.getProtectedElement() != null && "EncryptedData".equals(signedRef.getProtectedElement().getLocalName()) - && WSConstants.ENC_NS.equals(signedRef.getProtectedElement().getNamespaceURI())) { + && WSS4JConstants.ENC_NS.equals(signedRef.getProtectedElement().getNamespaceURI())) { String encryptedDataId = signedRef.getProtectedElement().getAttributeNS(null, "Id"); for (WSSecurityEngineResult result : encryptedResults) { http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AlgorithmSuitePolicyValidator.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AlgorithmSuitePolicyValidator.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AlgorithmSuitePolicyValidator.java index 2046657..7fa098f 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AlgorithmSuitePolicyValidator.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/AlgorithmSuitePolicyValidator.java @@ -32,6 +32,7 @@ import javax.xml.namespace.QName; import org.apache.cxf.helpers.CastUtils; import org.apache.cxf.ws.policy.AssertionInfo; import org.apache.cxf.ws.security.policy.PolicyUtils; +import org.apache.wss4j.common.WSS4JConstants; import org.apache.wss4j.common.principal.WSDerivedKeyTokenPrincipal; import org.apache.wss4j.dom.WSConstants; import org.apache.wss4j.dom.WSDataRef; @@ -167,11 +168,11 @@ public class AlgorithmSuitePolicyValidator extends AbstractSecurityPolicyValidat } for (String transformAlgorithm : transformAlgorithms) { if (!(algorithmPolicy.getC14n().getValue().equals(transformAlgorithm) - || WSConstants.C14N_EXCL_OMIT_COMMENTS.equals(transformAlgorithm) + || WSS4JConstants.C14N_EXCL_OMIT_COMMENTS.equals(transformAlgorithm) || STRTransform.TRANSFORM_URI.equals(transformAlgorithm) || Transforms.TRANSFORM_ENVELOPED_SIGNATURE.equals(transformAlgorithm) - || WSConstants.SWA_ATTACHMENT_CONTENT_SIG_TRANS.equals(transformAlgorithm) - || WSConstants.SWA_ATTACHMENT_COMPLETE_SIG_TRANS.equals(transformAlgorithm))) { + || WSS4JConstants.SWA_ATTACHMENT_CONTENT_SIG_TRANS.equals(transformAlgorithm) + || WSS4JConstants.SWA_ATTACHMENT_COMPLETE_SIG_TRANS.equals(transformAlgorithm))) { ai.setNotAsserted("The transform algorithms do not match the requirement"); return false; } http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/IssuedTokenPolicyValidator.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/IssuedTokenPolicyValidator.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/IssuedTokenPolicyValidator.java index d7d3f2f..b217cd8 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/IssuedTokenPolicyValidator.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/IssuedTokenPolicyValidator.java @@ -35,6 +35,7 @@ import org.apache.cxf.ws.policy.AssertionInfoMap; import org.apache.cxf.ws.security.SecurityConstants; import org.apache.cxf.ws.security.policy.PolicyUtils; import org.apache.cxf.ws.security.tokenstore.SecurityToken; +import org.apache.wss4j.common.WSS4JConstants; import org.apache.wss4j.common.saml.SAMLKeyInfo; import org.apache.wss4j.common.saml.SamlAssertionWrapper; import org.apache.wss4j.common.token.BinarySecurity; @@ -207,10 +208,10 @@ public class IssuedTokenPolicyValidator extends AbstractSamlPolicyValidator { while (child != null) { if ("TokenType".equals(child.getLocalName())) { String content = child.getTextContent(); - if (WSConstants.WSS_SAML_TOKEN_TYPE.equals(content) + if (WSS4JConstants.WSS_SAML_TOKEN_TYPE.equals(content) && assertionWrapper.getSamlVersion() != SAMLVersion.VERSION_11) { return false; - } else if (WSConstants.WSS_SAML2_TOKEN_TYPE.equals(content) + } else if (WSS4JConstants.WSS_SAML2_TOKEN_TYPE.equals(content) && assertionWrapper.getSamlVersion() != SAMLVersion.VERSION_20) { return false; } @@ -275,9 +276,9 @@ public class IssuedTokenPolicyValidator extends AbstractSamlPolicyValidator { } } if (assertionWrapper.getSaml1() != null) { - token.setTokenType(WSConstants.WSS_SAML_TOKEN_TYPE); + token.setTokenType(WSS4JConstants.WSS_SAML_TOKEN_TYPE); } else if (assertionWrapper.getSaml2() != null) { - token.setTokenType(WSConstants.WSS_SAML2_TOKEN_TYPE); + token.setTokenType(WSS4JConstants.WSS_SAML2_TOKEN_TYPE); } token.setToken(assertionWrapper.getElement()); http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/X509TokenPolicyValidator.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/X509TokenPolicyValidator.java b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/X509TokenPolicyValidator.java index d3e970a..cf9eb5f 100644 --- a/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/X509TokenPolicyValidator.java +++ b/rt/ws/security/src/main/java/org/apache/cxf/ws/security/wss4j/policyvalidators/X509TokenPolicyValidator.java @@ -33,6 +33,7 @@ import org.apache.cxf.common.logging.LogUtils; import org.apache.cxf.ws.policy.AssertionInfo; import org.apache.cxf.ws.policy.AssertionInfoMap; import org.apache.cxf.ws.security.policy.PolicyUtils; +import org.apache.wss4j.common.WSS4JConstants; import org.apache.wss4j.common.bsp.BSPEnforcer; import org.apache.wss4j.common.ext.WSSecurityException; import org.apache.wss4j.common.token.BinarySecurity; @@ -198,16 +199,16 @@ public class X509TokenPolicyValidator extends AbstractSecurityPolicyValidator { if (signatureElement != null) { Element keyInfoElement = XMLUtils.getDirectChildElement( - signatureElement, "KeyInfo", WSConstants.SIG_NS + signatureElement, "KeyInfo", WSS4JConstants.SIG_NS ); if (keyInfoElement != null) { Element strElement = XMLUtils.getDirectChildElement( - keyInfoElement, "SecurityTokenReference", WSConstants.WSSE_NS + keyInfoElement, "SecurityTokenReference", WSS4JConstants.WSSE_NS ); if (strElement != null) { return XMLUtils.getDirectChildElement( - strElement, "KeyIdentifier", WSConstants.WSSE_NS + strElement, "KeyIdentifier", WSS4JConstants.WSSE_NS ); } } http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/AbstractSecurityTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/AbstractSecurityTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/AbstractSecurityTest.java index 8b1a702..b886f9c 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/AbstractSecurityTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/AbstractSecurityTest.java @@ -50,21 +50,21 @@ import org.apache.cxf.message.MessageImpl; import org.apache.cxf.phase.PhaseInterceptor; import org.apache.cxf.staxutils.StaxUtils; import org.apache.cxf.test.AbstractCXFTest; -import org.apache.wss4j.dom.WSConstants; +import org.apache.wss4j.common.WSS4JConstants; public abstract class AbstractSecurityTest extends AbstractCXFTest { public AbstractSecurityTest() { super(); - addNamespace("wsse", WSConstants.WSSE_NS); - addNamespace("wsse11", WSConstants.WSSE11_NS); - addNamespace("ds", WSConstants.SIG_NS); + addNamespace("wsse", WSS4JConstants.WSSE_NS); + addNamespace("wsse11", WSS4JConstants.WSSE11_NS); + addNamespace("ds", WSS4JConstants.SIG_NS); addNamespace("s", Soap11.getInstance().getNamespace()); - addNamespace("xenc", WSConstants.ENC_NS); - addNamespace("wsu", WSConstants.WSU_NS); - addNamespace("saml1", WSConstants.SAML_NS); - addNamespace("saml2", WSConstants.SAML2_NS); + addNamespace("xenc", WSS4JConstants.ENC_NS); + addNamespace("wsu", WSS4JConstants.WSU_NS); + addNamespace("saml1", WSS4JConstants.SAML_NS); + addNamespace("saml2", WSS4JConstants.SAML2_NS); } /** http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/DOMToStaxRoundTripTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/DOMToStaxRoundTripTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/DOMToStaxRoundTripTest.java index 2828c63..ef5d5fe 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/DOMToStaxRoundTripTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/DOMToStaxRoundTripTest.java @@ -35,10 +35,12 @@ import org.apache.cxf.service.Service; import org.apache.cxf.transport.local.LocalTransportFactory; import org.apache.cxf.ws.security.SecurityConstants; import org.apache.wss4j.common.ConfigurationConstants; +import org.apache.wss4j.common.WSS4JConstants; import org.apache.wss4j.common.crypto.CryptoFactory; -import org.apache.wss4j.dom.WSConstants; import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; +import org.apache.xml.security.stax.ext.XMLSecurityConstants; + import org.junit.Test; @@ -67,7 +69,7 @@ public class DOMToStaxRoundTripTest extends AbstractSecurityTest { Map<String, Object> properties = new HashMap<>(); properties.put(ConfigurationConstants.ACTION, ConfigurationConstants.USERNAME_TOKEN); - properties.put(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_TEXT); + properties.put(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_TEXT); properties.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); properties.put(ConfigurationConstants.USER, "username"); @@ -115,7 +117,7 @@ public class DOMToStaxRoundTripTest extends AbstractSecurityTest { Map<String, Object> properties = new HashMap<>(); properties.put(ConfigurationConstants.ACTION, ConfigurationConstants.USERNAME_TOKEN); - properties.put(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_DIGEST); + properties.put(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_DIGEST); properties.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); properties.put(ConfigurationConstants.USER, "username"); @@ -199,8 +201,8 @@ public class DOMToStaxRoundTripTest extends AbstractSecurityTest { properties.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); properties.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); properties.put(ConfigurationConstants.USER, "myalias"); - properties.put(ConfigurationConstants.ENC_KEY_TRANSPORT, WSConstants.KEYTRANSPORT_RSA15); - properties.put(ConfigurationConstants.ENC_SYM_ALGO, WSConstants.TRIPLE_DES); + properties.put(ConfigurationConstants.ENC_KEY_TRANSPORT, WSS4JConstants.KEYTRANSPORT_RSA15); + properties.put(ConfigurationConstants.ENC_SYM_ALGO, WSS4JConstants.TRIPLE_DES); WSS4JOutInterceptor ohandler = new WSS4JOutInterceptor(properties); client.getOutInterceptors().add(ohandler); @@ -519,7 +521,7 @@ public class DOMToStaxRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties outProperties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); actions.add(WSSConstants.SIGNATURE_CONFIRMATION); outProperties.setActions(actions); outProperties.setSignatureUser("myalias"); http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxCryptoCoverageCheckerTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxCryptoCoverageCheckerTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxCryptoCoverageCheckerTest.java index 39c4015..ceb223b 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxCryptoCoverageCheckerTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxCryptoCoverageCheckerTest.java @@ -37,6 +37,8 @@ import org.apache.wss4j.common.crypto.CryptoFactory; import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; import org.apache.xml.security.stax.ext.SecurePart; +import org.apache.xml.security.stax.ext.XMLSecurityConstants; + import org.junit.Test; @@ -70,10 +72,10 @@ public class StaxCryptoCoverageCheckerTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.setEncryptionUser("myalias"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties outCryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -167,14 +169,14 @@ public class StaxCryptoCoverageCheckerTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.USERNAMETOKEN); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.addEncryptionPart( new SecurePart(new QName(WSSConstants.NS_WSSE10, "UsernameToken"), SecurePart.Modifier.Element) ); properties.setEncryptionUser("myalias"); properties.setTokenUser("username"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties outCryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -222,7 +224,7 @@ public class StaxCryptoCoverageCheckerTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.USERNAMETOKEN); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("myalias"); @@ -282,7 +284,7 @@ public class StaxCryptoCoverageCheckerTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("myalias"); @@ -369,7 +371,7 @@ public class StaxCryptoCoverageCheckerTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.TIMESTAMP); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.addSignaturePart( new SecurePart(new QName(WSSConstants.NS_WSU10, "Timestamp"), SecurePart.Modifier.Element) @@ -415,12 +417,12 @@ public class StaxCryptoCoverageCheckerTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.ENCRYPT); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setSignatureUser("myalias"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties outCryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripActionTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripActionTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripActionTest.java index 8a3617f..8eb454d 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripActionTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripActionTest.java @@ -41,6 +41,8 @@ import org.apache.wss4j.common.ext.WSSecurityException; import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; import org.apache.xml.security.stax.ext.SecurePart; +import org.apache.xml.security.stax.ext.XMLSecurityConstants; + import org.junit.Test; /** @@ -86,7 +88,7 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.USERNAMETOKEN); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); inProperties.setActions(actions); try { @@ -158,7 +160,7 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { WSSSecurityProperties inProperties = new WSSSecurityProperties(); inProperties.setCallbackHandler(new TestPwdCallback()); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); inProperties.setActions(actions); Properties cryptoProperties = CryptoFactory.getProperties("insecurity.properties", this.getClass().getClassLoader()); @@ -176,10 +178,10 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.setEncryptionUser("myalias"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties outCryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -191,8 +193,8 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { assertEquals("test", echo.echo("test")); actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.ENCRYPT); + actions.add(XMLSecurityConstants.SIGNATURE); inProperties.setActions(actions); try { @@ -229,7 +231,7 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { outConfig.put(ConfigurationConstants.ENCRYPTION_USER, "myalias"); outConfig.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); outConfig.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); - outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, WSSConstants.NS_XENC_AES128); + outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, XMLSecurityConstants.NS_XENC_AES128); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(outConfig); client.getOutInterceptors().add(ohandler); @@ -260,7 +262,7 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { WSSSecurityProperties inProperties = new WSSSecurityProperties(); inProperties.setCallbackHandler(new TestPwdCallback()); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); actions.add(WSSConstants.USERNAMETOKEN); inProperties.setActions(actions); Properties cryptoProperties = @@ -280,14 +282,14 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.USERNAMETOKEN); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.addEncryptionPart( new SecurePart(new QName(WSSConstants.NS_WSSE10, "UsernameToken"), SecurePart.Modifier.Element) ); properties.setEncryptionUser("myalias"); properties.setTokenUser("username"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties outCryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -335,7 +337,7 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { outConfig.put(ConfigurationConstants.ENCRYPTION_USER, "myalias"); outConfig.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); outConfig.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); - outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, WSSConstants.NS_XENC_AES128); + outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, XMLSecurityConstants.NS_XENC_AES128); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(outConfig); client.getOutInterceptors().add(ohandler); @@ -352,7 +354,7 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { Properties cryptoProperties = CryptoFactory.getProperties("insecurity.properties", this.getClass().getClassLoader()); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); inProperties.setActions(actions); inProperties.setSignatureVerificationCryptoProperties(cryptoProperties); WSS4JStaxInInterceptor inhandler = new WSS4JStaxInInterceptor(inProperties); @@ -371,7 +373,7 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("myalias"); @@ -385,8 +387,8 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { assertEquals("test", echo.echo("test")); actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.SIGNATURE); + actions.add(XMLSecurityConstants.ENCRYPT); inProperties.setActions(actions); try { @@ -515,7 +517,7 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { inProperties.setCallbackHandler(new TestPwdCallback()); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.TIMESTAMP); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); inProperties.setActions(actions); Properties cryptoProperties = CryptoFactory.getProperties("insecurity.properties", this.getClass().getClassLoader()); @@ -534,7 +536,7 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.TIMESTAMP); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.addSignaturePart( new SecurePart(new QName(WSSConstants.NS_WSU10, "Timestamp"), SecurePart.Modifier.Element) @@ -604,8 +606,8 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { WSSSecurityProperties inProperties = new WSSSecurityProperties(); inProperties.setCallbackHandler(new TestPwdCallback()); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.ENCRYPT); + actions.add(XMLSecurityConstants.SIGNATURE); inProperties.setActions(actions); Properties cryptoProperties = CryptoFactory.getProperties("insecurity.properties", this.getClass().getClassLoader()); @@ -624,12 +626,12 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.ENCRYPT); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setSignatureUser("myalias"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties outCryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -676,7 +678,7 @@ public class StaxRoundTripActionTest extends AbstractSecurityTest { outConfig.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); outConfig.put(ConfigurationConstants.SIG_PROP_FILE, "outsecurity.properties"); outConfig.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); - outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, WSSConstants.NS_XENC_AES128); + outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, XMLSecurityConstants.NS_XENC_AES128); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(outConfig); client.getOutInterceptors().add(ohandler); http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripTest.java index 43ecb83..e9a49b9 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxRoundTripTest.java @@ -47,6 +47,8 @@ import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; import org.apache.wss4j.stax.securityToken.WSSecurityTokenConstants; import org.apache.xml.security.stax.ext.SecurePart; +import org.apache.xml.security.stax.ext.XMLSecurityConstants; + import org.junit.Test; @@ -438,9 +440,9 @@ public class StaxRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); properties.setEncryptionUser("myalias"); Properties outCryptoProperties = @@ -474,7 +476,7 @@ public class StaxRoundTripTest extends AbstractSecurityTest { Map<String, Object> outConfig = new HashMap<>(); outConfig.put(ConfigurationConstants.ACTION, ConfigurationConstants.ENCRYPT); outConfig.put(ConfigurationConstants.ENCRYPTION_USER, "myalias"); - outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, WSSConstants.NS_XENC_AES128); + outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, XMLSecurityConstants.NS_XENC_AES128); outConfig.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); outConfig.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(outConfig); @@ -507,14 +509,14 @@ public class StaxRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.USERNAMETOKEN); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.addEncryptionPart( new SecurePart(new QName(WSSConstants.NS_WSSE10, "UsernameToken"), SecurePart.Modifier.Element) ); properties.setEncryptionUser("myalias"); properties.setTokenUser("username"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties outCryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -557,7 +559,7 @@ public class StaxRoundTripTest extends AbstractSecurityTest { outConfig.put(ConfigurationConstants.ENCRYPTION_USER, "myalias"); outConfig.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); outConfig.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); - outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, WSSConstants.NS_XENC_AES128); + outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, XMLSecurityConstants.NS_XENC_AES128); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(outConfig); client.getOutInterceptors().add(ohandler); @@ -590,7 +592,7 @@ public class StaxRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("myalias"); @@ -664,7 +666,7 @@ public class StaxRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.USERNAMETOKEN); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("myalias"); @@ -803,7 +805,7 @@ public class StaxRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.TIMESTAMP); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.addSignaturePart( new SecurePart(new QName(WSSConstants.NS_WSU10, "Timestamp"), SecurePart.Modifier.Element) @@ -886,7 +888,7 @@ public class StaxRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("alice"); @@ -963,12 +965,12 @@ public class StaxRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.ENCRYPT); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setSignatureUser("myalias"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties outCryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -1010,7 +1012,7 @@ public class StaxRoundTripTest extends AbstractSecurityTest { outConfig.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); outConfig.put(ConfigurationConstants.SIG_PROP_FILE, "outsecurity.properties"); outConfig.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); - outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, WSSConstants.NS_XENC_AES128); + outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, XMLSecurityConstants.NS_XENC_AES128); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(outConfig); client.getOutInterceptors().add(ohandler); @@ -1033,7 +1035,7 @@ public class StaxRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties outProperties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); actions.add(WSSConstants.SIGNATURE_CONFIRMATION); outProperties.setActions(actions); outProperties.setSignatureUser("myalias"); @@ -1054,7 +1056,7 @@ public class StaxRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("myalias"); http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMEncryptionIdentifierTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMEncryptionIdentifierTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMEncryptionIdentifierTest.java index dc5b125..0c592e9 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMEncryptionIdentifierTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMEncryptionIdentifierTest.java @@ -38,6 +38,8 @@ import org.apache.wss4j.common.crypto.CryptoFactory; import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; import org.apache.wss4j.stax.securityToken.WSSecurityTokenConstants; +import org.apache.xml.security.stax.ext.XMLSecurityConstants; + import org.junit.Test; @@ -68,13 +70,13 @@ public class StaxToDOMEncryptionIdentifierTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setEncryptionKeyIdentifier( WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE ); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties cryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -107,13 +109,13 @@ public class StaxToDOMEncryptionIdentifierTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setEncryptionKeyIdentifier( WSSecurityTokenConstants.KeyIdentifier_IssuerSerial ); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties cryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -146,13 +148,13 @@ public class StaxToDOMEncryptionIdentifierTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setEncryptionKeyIdentifier( WSSecurityTokenConstants.KEYIDENTIFIER_THUMBPRINT_IDENTIFIER ); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties cryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -186,13 +188,13 @@ public class StaxToDOMEncryptionIdentifierTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setEncryptionKeyIdentifier( WSSecurityTokenConstants.KeyIdentifier_X509KeyIdentifier ); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties cryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -225,13 +227,13 @@ public class StaxToDOMEncryptionIdentifierTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setEncryptionKeyIdentifier( WSSecurityTokenConstants.KEYIDENTIFIER_ENCRYPTED_KEY_SHA1_IDENTIFIER ); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties cryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMRoundTripTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMRoundTripTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMRoundTripTest.java index aa10704..e9491d1 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMRoundTripTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMRoundTripTest.java @@ -37,12 +37,14 @@ import org.apache.cxf.service.Service; import org.apache.cxf.transport.local.LocalTransportFactory; import org.apache.cxf.ws.security.SecurityConstants; import org.apache.wss4j.common.ConfigurationConstants; +import org.apache.wss4j.common.WSS4JConstants; import org.apache.wss4j.common.crypto.CryptoFactory; -import org.apache.wss4j.dom.WSConstants; import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; import org.apache.wss4j.stax.securityToken.WSSecurityTokenConstants; import org.apache.xml.security.stax.ext.SecurePart; +import org.apache.xml.security.stax.ext.XMLSecurityConstants; + import org.junit.Test; @@ -58,7 +60,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { Map<String, Object> inProperties = new HashMap<>(); inProperties.put(ConfigurationConstants.ACTION, ConfigurationConstants.USERNAME_TOKEN); - inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_TEXT); + inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_TEXT); inProperties.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); WSS4JInInterceptor inInterceptor = new WSS4JInInterceptor(inProperties); service.getInInterceptors().add(inInterceptor); @@ -84,7 +86,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { // Negative test for wrong password type service.getInInterceptors().remove(inInterceptor); - inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_DIGEST); + inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_DIGEST); inInterceptor = new WSS4JInInterceptor(inProperties); service.getInInterceptors().add(inInterceptor); @@ -108,7 +110,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { Map<String, Object> inProperties = new HashMap<>(); inProperties.put(ConfigurationConstants.ACTION, ConfigurationConstants.USERNAME_TOKEN); - inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_TEXT); + inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_TEXT); inProperties.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); WSS4JInInterceptor inInterceptor = new WSS4JInInterceptor(inProperties); service.getInInterceptors().add(inInterceptor); @@ -133,7 +135,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { // Negative test for wrong password type service.getInInterceptors().remove(inInterceptor); - inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_DIGEST); + inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_DIGEST); inInterceptor = new WSS4JInInterceptor(inProperties); service.getInInterceptors().add(inInterceptor); @@ -156,7 +158,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { Map<String, Object> inProperties = new HashMap<>(); inProperties.put(ConfigurationConstants.ACTION, ConfigurationConstants.USERNAME_TOKEN); - inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_DIGEST); + inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_DIGEST); inProperties.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); WSS4JInInterceptor inInterceptor = new WSS4JInInterceptor(inProperties); service.getInInterceptors().add(inInterceptor); @@ -182,7 +184,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { // Negative test for wrong password type service.getInInterceptors().remove(inInterceptor); - inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_TEXT); + inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_TEXT); inInterceptor = new WSS4JInInterceptor(inProperties); service.getInInterceptors().add(inInterceptor); @@ -205,7 +207,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { Map<String, Object> inProperties = new HashMap<>(); inProperties.put(ConfigurationConstants.ACTION, ConfigurationConstants.USERNAME_TOKEN); - inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_DIGEST); + inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_DIGEST); inProperties.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); WSS4JInInterceptor inInterceptor = new WSS4JInInterceptor(inProperties); service.getInInterceptors().add(inInterceptor); @@ -230,7 +232,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { // Negative test for wrong password type service.getInInterceptors().remove(inInterceptor); - inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_TEXT); + inProperties.put(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_TEXT); inInterceptor = new WSS4JInInterceptor(inProperties); service.getInInterceptors().add(inInterceptor); @@ -267,10 +269,10 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.setEncryptionUser("myalias"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties cryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -306,7 +308,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { outConfig.put(ConfigurationConstants.ENCRYPTION_USER, "myalias"); outConfig.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); outConfig.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); - outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, WSSConstants.NS_XENC_AES128); + outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, XMLSecurityConstants.NS_XENC_AES128); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(outConfig); client.getOutInterceptors().add(ohandler); @@ -335,7 +337,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.setEncryptionUser("myalias"); @@ -390,7 +392,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { ConfigurationConstants.ENC_SYM_ALGO, "http://www.w3.org/2001/04/xmlenc#tripledes-cbc" ); - outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, WSSConstants.NS_XENC_AES128); + outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, XMLSecurityConstants.NS_XENC_AES128); outConfig.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(outConfig); @@ -432,14 +434,14 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.USERNAMETOKEN); - actions.add(WSSConstants.ENCRYPT); + actions.add(XMLSecurityConstants.ENCRYPT); properties.setActions(actions); properties.addEncryptionPart( new SecurePart(new QName(WSSConstants.NS_WSSE10, "UsernameToken"), SecurePart.Modifier.Element) ); properties.setEncryptionUser("myalias"); properties.setTokenUser("username"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties cryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -486,7 +488,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { outConfig.put(ConfigurationConstants.ENCRYPTION_USER, "myalias"); outConfig.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); outConfig.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); - outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, WSSConstants.NS_XENC_AES128); + outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, XMLSecurityConstants.NS_XENC_AES128); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(outConfig); client.getOutInterceptors().add(ohandler); @@ -515,7 +517,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("myalias"); @@ -585,7 +587,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.USERNAMETOKEN); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("myalias"); @@ -763,7 +765,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); actions.add(WSSConstants.TIMESTAMP); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.addSignaturePart( new SecurePart(new QName(WSSConstants.NS_WSU10, "Timestamp"), SecurePart.Modifier.Element) @@ -849,7 +851,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); actions.add(WSSConstants.TIMESTAMP); properties.setActions(actions); properties.addSignaturePart( @@ -896,7 +898,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("alice"); @@ -973,12 +975,12 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.ENCRYPT); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.ENCRYPT); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setEncryptionUser("myalias"); properties.setSignatureUser("myalias"); - properties.setEncryptionSymAlgorithm(WSSConstants.NS_XENC_AES128); + properties.setEncryptionSymAlgorithm(XMLSecurityConstants.NS_XENC_AES128); Properties cryptoProperties = CryptoFactory.getProperties("outsecurity.properties", this.getClass().getClassLoader()); @@ -1024,7 +1026,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { outConfig.put(ConfigurationConstants.PW_CALLBACK_REF, new TestPwdCallback()); outConfig.put(ConfigurationConstants.SIG_PROP_FILE, "outsecurity.properties"); outConfig.put(ConfigurationConstants.ENC_PROP_FILE, "outsecurity.properties"); - outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, WSSConstants.NS_XENC_AES128); + outConfig.put(ConfigurationConstants.ENC_SYM_ALGO, XMLSecurityConstants.NS_XENC_AES128); WSS4JStaxOutInterceptor ohandler = new WSS4JStaxOutInterceptor(outConfig); client.getOutInterceptors().add(ohandler); @@ -1063,7 +1065,7 @@ public class StaxToDOMRoundTripTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureUser("myalias"); http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMSignatureIdentifierTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMSignatureIdentifierTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMSignatureIdentifierTest.java index f2d987b..e0827d2 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMSignatureIdentifierTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/StaxToDOMSignatureIdentifierTest.java @@ -38,6 +38,8 @@ import org.apache.wss4j.common.crypto.CryptoFactory; import org.apache.wss4j.stax.ext.WSSConstants; import org.apache.wss4j.stax.ext.WSSSecurityProperties; import org.apache.wss4j.stax.securityToken.WSSecurityTokenConstants; +import org.apache.xml.security.stax.ext.XMLSecurityConstants; + import org.junit.Test; @@ -68,7 +70,7 @@ public class StaxToDOMSignatureIdentifierTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureKeyIdentifier( WSSecurityTokenConstants.KEYIDENTIFIER_SECURITY_TOKEN_DIRECT_REFERENCE @@ -106,7 +108,7 @@ public class StaxToDOMSignatureIdentifierTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureKeyIdentifier( WSSecurityTokenConstants.KeyIdentifier_IssuerSerial @@ -144,7 +146,7 @@ public class StaxToDOMSignatureIdentifierTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureKeyIdentifier( WSSecurityTokenConstants.KEYIDENTIFIER_THUMBPRINT_IDENTIFIER @@ -183,7 +185,7 @@ public class StaxToDOMSignatureIdentifierTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureKeyIdentifier( WSSecurityTokenConstants.KeyIdentifier_X509KeyIdentifier @@ -222,7 +224,7 @@ public class StaxToDOMSignatureIdentifierTest extends AbstractSecurityTest { WSSSecurityProperties properties = new WSSSecurityProperties(); List<WSSConstants.Action> actions = new ArrayList<WSSConstants.Action>(); - actions.add(WSSConstants.SIGNATURE); + actions.add(XMLSecurityConstants.SIGNATURE); properties.setActions(actions); properties.setSignatureKeyIdentifier( WSSecurityTokenConstants.KeyIdentifier_KeyValue http://git-wip-us.apache.org/repos/asf/cxf/blob/f0797a55/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/UserNameTokenAuthorizationTest.java ---------------------------------------------------------------------- diff --git a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/UserNameTokenAuthorizationTest.java b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/UserNameTokenAuthorizationTest.java index a0242fd..6db3d82 100644 --- a/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/UserNameTokenAuthorizationTest.java +++ b/rt/ws/security/src/test/java/org/apache/cxf/ws/security/wss4j/UserNameTokenAuthorizationTest.java @@ -36,8 +36,7 @@ import org.apache.cxf.service.Service; import org.apache.cxf.transport.local.LocalConduit; import org.apache.cxf.transport.local.LocalTransportFactory; import org.apache.wss4j.common.ConfigurationConstants; -import org.apache.wss4j.dom.WSConstants; - +import org.apache.wss4j.common.WSS4JConstants; import org.junit.Test; public class UserNameTokenAuthorizationTest extends AbstractSecurityTest { @@ -81,14 +80,14 @@ public class UserNameTokenAuthorizationTest extends AbstractSecurityTest { if (digest) { wsOut.setProperty("password", "myAliasPassword"); } else { - wsOut.setProperty(ConfigurationConstants.PASSWORD_TYPE, WSConstants.PW_TEXT); + wsOut.setProperty(ConfigurationConstants.PASSWORD_TYPE, WSS4JConstants.PW_TEXT); } if (encryptUsernameTokenOnly) { wsOut.setProperty(ConfigurationConstants.ENCRYPTION_USER, "myalias"); wsOut.setProperty( ConfigurationConstants.ENCRYPTION_PARTS, - "{Content}{" + WSConstants.WSSE_NS + "}UsernameToken" + "{Content}{" + WSS4JConstants.WSSE_NS + "}UsernameToken" ); } wsOut.setProperty(ConfigurationConstants.PW_CALLBACK_CLASS, TestPwdCallback.class.getName());