ws-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From cohei...@apache.org
Subject svn commit: r1040462 - in /webservices/wss4j/site: testapidocs/wssec/TestWSSecurityWSS40.html testapidocs/wssec/class-use/TestWSSecuritySAMLKeyIdentifier.html xref-test/wssec/TestWSSecuritySAMLKeyIdentifier.html xref-test/wssec/TestWSSecurityWSS40.html
Date Tue, 30 Nov 2010 11:11:34 GMT
Author: coheigea
Date: Tue Nov 30 11:11:34 2010
New Revision: 1040462

URL: http://svn.apache.org/viewvc?rev=1040462&view=rev
Log:
Some missing files from the last commit.

Added:
    webservices/wss4j/site/testapidocs/wssec/TestWSSecurityWSS40.html
    webservices/wss4j/site/testapidocs/wssec/class-use/TestWSSecuritySAMLKeyIdentifier.html
    webservices/wss4j/site/xref-test/wssec/TestWSSecuritySAMLKeyIdentifier.html
    webservices/wss4j/site/xref-test/wssec/TestWSSecurityWSS40.html

Added: webservices/wss4j/site/testapidocs/wssec/TestWSSecurityWSS40.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/testapidocs/wssec/TestWSSecurityWSS40.html?rev=1040462&view=auto
==============================================================================
--- webservices/wss4j/site/testapidocs/wssec/TestWSSecurityWSS40.html (added)
+++ webservices/wss4j/site/testapidocs/wssec/TestWSSecurityWSS40.html Tue Nov 30 11:11:34 2010
@@ -0,0 +1,539 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
+<!--NewPage-->
+<HTML>
+<HEAD>
+<!-- Generated by javadoc (build 1.4.2_19) on Thu Nov 25 12:48:17 GMT 2010 -->
+<META http-equiv="Content-Type" content="text/html; charset=UTF-8">
+<TITLE>
+TestWSSecurityWSS40 (WSS4J 1.5.10 Test API)
+</TITLE>
+
+<META NAME="keywords" CONTENT="wssec.TestWSSecurityWSS40 class">
+
+<LINK REL ="stylesheet" TYPE="text/css" HREF="../stylesheet.css" TITLE="Style">
+
+<SCRIPT type="text/javascript">
+function windowTitle()
+{
+    parent.document.title="TestWSSecurityWSS40 (WSS4J 1.5.10 Test API)";
+}
+</SCRIPT>
+
+</HEAD>
+
+<BODY BGCOLOR="white" onload="windowTitle();">
+
+
+<!-- ========= START OF TOP NAVBAR ======= -->
+<A NAME="navbar_top"><!-- --></A>
+<A HREF="#skip-navbar_top" title="Skip navigation links"></A>
+<TABLE BORDER="0" WIDTH="100%" CELLPADDING="1" CELLSPACING="0" SUMMARY="">
+<TR>
+<TD COLSPAN=3 BGCOLOR="#EEEEFF" CLASS="NavBarCell1">
+<A NAME="navbar_top_firstrow"><!-- --></A>
+<TABLE BORDER="0" CELLPADDING="0" CELLSPACING="3" SUMMARY="">
+  <TR ALIGN="center" VALIGN="top">
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../overview-summary.html"><FONT CLASS="NavBarFont1"><B>Overview</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="package-summary.html"><FONT CLASS="NavBarFont1"><B>Package</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#FFFFFF" CLASS="NavBarCell1Rev"> &nbsp;<FONT CLASS="NavBarFont1Rev"><B>Class</B></FONT>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="class-use/TestWSSecurityWSS40.html"><FONT CLASS="NavBarFont1"><B>Use</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="package-tree.html"><FONT CLASS="NavBarFont1"><B>Tree</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../deprecated-list.html"><FONT CLASS="NavBarFont1"><B>Deprecated</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../index-all.html"><FONT CLASS="NavBarFont1"><B>Index</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../help-doc.html"><FONT CLASS="NavBarFont1"><B>Help</B></FONT></A>&nbsp;</TD>
+  </TR>
+</TABLE>
+</TD>
+<TD ALIGN="right" VALIGN="top" ROWSPAN=3><EM>
+</EM>
+</TD>
+</TR>
+
+<TR>
+<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
+&nbsp;<A HREF="../wssec/TestWSSecurityWSS245.MyCallbackHandler.html" title="class in wssec"><B>PREV CLASS</B></A>&nbsp;
+&nbsp;<A HREF="../wssec/TestWSSecurityWSS60.html" title="class in wssec"><B>NEXT CLASS</B></A></FONT></TD>
+<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
+  <A HREF="../index.html" target="_top"><B>FRAMES</B></A>  &nbsp;
+&nbsp;<A HREF="TestWSSecurityWSS40.html" target="_top"><B>NO FRAMES</B></A>  &nbsp;
+&nbsp;<SCRIPT type="text/javascript">
+  <!--
+  if(window==top) {
+    document.writeln('<A HREF="../allclasses-noframe.html"><B>All Classes</B></A>');
+  }
+  //-->
+</SCRIPT>
+<NOSCRIPT>
+  <A HREF="../allclasses-noframe.html"><B>All Classes</B></A>
+</NOSCRIPT>
+
+</FONT></TD>
+</TR>
+<TR>
+<TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2">
+  SUMMARY:&nbsp;NESTED&nbsp;|&nbsp;FIELD&nbsp;|&nbsp;<A HREF="#constructor_summary">CONSTR</A>&nbsp;|&nbsp;<A HREF="#method_summary">METHOD</A></FONT></TD>
+<TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2">
+DETAIL:&nbsp;FIELD&nbsp;|&nbsp;<A HREF="#constructor_detail">CONSTR</A>&nbsp;|&nbsp;<A HREF="#method_detail">METHOD</A></FONT></TD>
+</TR>
+</TABLE>
+<A NAME="skip-navbar_top"></A>
+<!-- ========= END OF TOP NAVBAR ========= -->
+
+<HR>
+<!-- ======== START OF CLASS DATA ======== -->
+<H2>
+<FONT SIZE="-1">
+wssec</FONT>
+<BR>
+Class TestWSSecurityWSS40</H2>
+<PRE>
+java.lang.Object
+  <IMG SRC="../resources/inherit.gif" ALT="extended by">junit.framework.Assert
+      <IMG SRC="../resources/inherit.gif" ALT="extended by">junit.framework.TestCase
+          <IMG SRC="../resources/inherit.gif" ALT="extended by"><B>wssec.TestWSSecurityWSS40</B>
+</PRE>
+<DL>
+<DT><B>All Implemented Interfaces:</B> <DD>javax.security.auth.callback.CallbackHandler, junit.framework.Test</DD>
+</DL>
+<HR>
+<DL>
+<DT>public class <B>TestWSSecurityWSS40</B><DT>extends junit.framework.TestCase<DT>implements javax.security.auth.callback.CallbackHandler</DL>
+
+<P>
+This is a test for WSS-40. Essentially it just tests that a message is signed using a
+ keyEntry from one keystore, and verified at the other end with a keystore with just the
+ CA cert in it.
+ 
+ http://issues.apache.org/jira/browse/WSS-40
+ 
+ Generate the CA keys/certs + export the CA cert to a keystore
+ 
+ openssl req -x509 -newkey rsa:1024 -keyout wss40CAKey.pem -out wss40CA.pem 
+ -config ca.config -days 3650
+ openssl x509 -outform DER -in wss40CA.pem -out wss40CA.crt
+ keytool -import -file wss40CA.crt -alias wss40CA -keystore wss40CA.jks
+ 
+ Generate the client keypair, make a csr, sign it with the CA key
+ 
+ keytool -genkey -validity 3650 -alias wss40 -keyalg RSA -keystore wss40.jks 
+ -dname "CN=Colm,OU=WSS4J,O=Apache,L=Dublin,ST=Leinster,C=IE"
+ keytool -certreq -alias wss40 -keystore wss40.jks -file wss40.cer
+ openssl ca -config ca.config -policy policy_anything -days 3650 -out wss40.pem 
+ -infiles wss40.cer
+ openssl x509 -outform DER -in wss40.pem -out wss40.crt
+ 
+ Import the CA cert into wss40.jks and import the new signed certificate
+ 
+ keytool -import -file wss40CA.crt -alias wss40CA -keystore wss40.jks
+ keytool -import -file wss40.crt -alias wss40 -keystore wss40.jks
+<P>
+
+<P>
+<HR>
+
+<P>
+<!-- ======== NESTED CLASS SUMMARY ======== -->
+
+
+<!-- =========== FIELD SUMMARY =========== -->
+
+
+<!-- ======== CONSTRUCTOR SUMMARY ======== -->
+
+<A NAME="constructor_summary"><!-- --></A>
+<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
+<TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor">
+<TD COLSPAN=2><FONT SIZE="+2">
+<B>Constructor Summary</B></FONT></TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD><CODE><B><A HREF="../wssec/TestWSSecurityWSS40.html#TestWSSecurityWSS40(java.lang.String)">TestWSSecurityWSS40</A></B>(java.lang.String&nbsp;name)</CODE>
+
+<BR>
+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TestWSSecurity constructor</TD>
+</TR>
+</TABLE>
+&nbsp;
+<!-- ========== METHOD SUMMARY =========== -->
+
+<A NAME="method_summary"><!-- --></A>
+<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
+<TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor">
+<TD COLSPAN=2><FONT SIZE="+2">
+<B>Method Summary</B></FONT></TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
+<CODE>protected &nbsp;org.apache.axis.message.SOAPEnvelope</CODE></FONT></TD>
+<TD><CODE><B><A HREF="../wssec/TestWSSecurityWSS40.html#getSOAPEnvelope()">getSOAPEnvelope</A></B>()</CODE>
+
+<BR>
+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Constructs a soap envelope
+ <p/></TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
+<CODE>&nbsp;void</CODE></FONT></TD>
+<TD><CODE><B><A HREF="../wssec/TestWSSecurityWSS40.html#handle(javax.security.auth.callback.Callback[])">handle</A></B>(javax.security.auth.callback.Callback[]&nbsp;callbacks)</CODE>
+
+<BR>
+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
+<CODE>protected &nbsp;void</CODE></FONT></TD>
+<TD><CODE><B><A HREF="../wssec/TestWSSecurityWSS40.html#setUp()">setUp</A></B>()</CODE>
+
+<BR>
+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Setup method
+ <p/></TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
+<CODE>static&nbsp;junit.framework.Test</CODE></FONT></TD>
+<TD><CODE><B><A HREF="../wssec/TestWSSecurityWSS40.html#suite()">suite</A></B>()</CODE>
+
+<BR>
+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;JUnit suite</TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
+<CODE>&nbsp;void</CODE></FONT></TD>
+<TD><CODE><B><A HREF="../wssec/TestWSSecurityWSS40.html#testMultipleCertsWSHandler()">testMultipleCertsWSHandler</A></B>()</CODE>
+
+<BR>
+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;A test for "SignatureAction does not set DigestAlgorithm on WSSecSignature instance"</TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
+<CODE>&nbsp;void</CODE></FONT></TD>
+<TD><CODE><B><A HREF="../wssec/TestWSSecurityWSS40.html#testSignatureBadCACert()">testSignatureBadCACert</A></B>()</CODE>
+
+<BR>
+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Test signing a SOAP message using a BST.</TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
+<CODE>&nbsp;void</CODE></FONT></TD>
+<TD><CODE><B><A HREF="../wssec/TestWSSecurityWSS40.html#testSignatureDirectReference()">testSignatureDirectReference</A></B>()</CODE>
+
+<BR>
+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Test signing a SOAP message using a BST.</TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
+<CODE>&nbsp;void</CODE></FONT></TD>
+<TD><CODE><B><A HREF="../wssec/TestWSSecurityWSS40.html#testSignatureDirectReferenceCACert()">testSignatureDirectReferenceCACert</A></B>()</CODE>
+
+<BR>
+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Test signing a SOAP message using a BST, sending the CA cert as well in the
+ message.</TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD ALIGN="right" VALIGN="top" WIDTH="1%"><FONT SIZE="-1">
+<CODE>&nbsp;void</CODE></FONT></TD>
+<TD><CODE><B><A HREF="../wssec/TestWSSecurityWSS40.html#testSignatureIssuerSerial()">testSignatureIssuerSerial</A></B>()</CODE>
+
+<BR>
+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Test signing a SOAP message using Issuer Serial.</TD>
+</TR>
+</TABLE>
+&nbsp;<A NAME="methods_inherited_from_class_junit.framework.TestCase"><!-- --></A>
+<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
+<TR BGCOLOR="#EEEEFF" CLASS="TableSubHeadingColor">
+<TD><B>Methods inherited from class junit.framework.TestCase</B></TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD><CODE>countTestCases, createResult, getName, run, run, runBare, runTest, setName, tearDown, toString</CODE></TD>
+</TR>
+</TABLE>
+&nbsp;<A NAME="methods_inherited_from_class_junit.framework.Assert"><!-- --></A>
+<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
+<TR BGCOLOR="#EEEEFF" CLASS="TableSubHeadingColor">
+<TD><B>Methods inherited from class junit.framework.Assert</B></TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD><CODE>assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertEquals, assertFalse, assertFalse, assertNotNull, assertNotNull, assertNotSame, assertNotSame, assertNull, assertNull, assertSame, assertSame, assertTrue, assertTrue, fail, fail</CODE></TD>
+</TR>
+</TABLE>
+&nbsp;<A NAME="methods_inherited_from_class_java.lang.Object"><!-- --></A>
+<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
+<TR BGCOLOR="#EEEEFF" CLASS="TableSubHeadingColor">
+<TD><B>Methods inherited from class java.lang.Object</B></TD>
+</TR>
+<TR BGCOLOR="white" CLASS="TableRowColor">
+<TD><CODE>clone, equals, finalize, getClass, hashCode, notify, notifyAll, wait, wait, wait</CODE></TD>
+</TR>
+</TABLE>
+&nbsp;
+<P>
+
+<!-- ============ FIELD DETAIL =========== -->
+
+
+<!-- ========= CONSTRUCTOR DETAIL ======== -->
+
+<A NAME="constructor_detail"><!-- --></A>
+<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
+<TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor">
+<TD COLSPAN=1><FONT SIZE="+2">
+<B>Constructor Detail</B></FONT></TD>
+</TR>
+</TABLE>
+
+<A NAME="TestWSSecurityWSS40(java.lang.String)"><!-- --></A><H3>
+TestWSSecurityWSS40</H3>
+<PRE>
+public <B>TestWSSecurityWSS40</B>(java.lang.String&nbsp;name)</PRE>
+<DL>
+<DD>TestWSSecurity constructor
+<P>
+<DT><B>Parameters:</B><DD><CODE>name</CODE> - name of the test</DL>
+
+<!-- ============ METHOD DETAIL ========== -->
+
+<A NAME="method_detail"><!-- --></A>
+<TABLE BORDER="1" WIDTH="100%" CELLPADDING="3" CELLSPACING="0" SUMMARY="">
+<TR BGCOLOR="#CCCCFF" CLASS="TableHeadingColor">
+<TD COLSPAN=1><FONT SIZE="+2">
+<B>Method Detail</B></FONT></TD>
+</TR>
+</TABLE>
+
+<A NAME="suite()"><!-- --></A><H3>
+suite</H3>
+<PRE>
+public static junit.framework.Test <B>suite</B>()</PRE>
+<DL>
+<DD>JUnit suite
+<P>
+<DD><DL>
+</DL>
+</DD>
+<DD><DL>
+
+<DT><B>Returns:</B><DD>a junit test suite</DL>
+</DD>
+</DL>
+<HR>
+
+<A NAME="setUp()"><!-- --></A><H3>
+setUp</H3>
+<PRE>
+protected void <B>setUp</B>()
+              throws java.lang.Exception</PRE>
+<DL>
+<DD>Setup method
+ <p/>
+<P>
+<DD><DL>
+</DL>
+</DD>
+<DD><DL>
+
+<DT><B>Throws:</B>
+<DD><CODE>java.lang.Exception</CODE> - Thrown when there is a problem in setup</DL>
+</DD>
+</DL>
+<HR>
+
+<A NAME="getSOAPEnvelope()"><!-- --></A><H3>
+getSOAPEnvelope</H3>
+<PRE>
+protected org.apache.axis.message.SOAPEnvelope <B>getSOAPEnvelope</B>()
+                                                        throws java.lang.Exception</PRE>
+<DL>
+<DD>Constructs a soap envelope
+ <p/>
+<P>
+<DD><DL>
+</DL>
+</DD>
+<DD><DL>
+
+<DT><B>Returns:</B><DD>soap envelope
+<DT><B>Throws:</B>
+<DD><CODE>java.lang.Exception</CODE> - if there is any problem constructing the soap envelope</DL>
+</DD>
+</DL>
+<HR>
+
+<A NAME="testSignatureDirectReference()"><!-- --></A><H3>
+testSignatureDirectReference</H3>
+<PRE>
+public void <B>testSignatureDirectReference</B>()
+                                  throws java.lang.Exception</PRE>
+<DL>
+<DD>Test signing a SOAP message using a BST.
+<P>
+<DD><DL>
+</DL>
+</DD>
+<DD><DL>
+
+<DT><B>Throws:</B>
+<DD><CODE>java.lang.Exception</CODE></DL>
+</DD>
+</DL>
+<HR>
+
+<A NAME="testSignatureDirectReferenceCACert()"><!-- --></A><H3>
+testSignatureDirectReferenceCACert</H3>
+<PRE>
+public void <B>testSignatureDirectReferenceCACert</B>()
+                                        throws java.lang.Exception</PRE>
+<DL>
+<DD>Test signing a SOAP message using a BST, sending the CA cert as well in the
+ message.
+<P>
+<DD><DL>
+</DL>
+</DD>
+<DD><DL>
+
+<DT><B>Throws:</B>
+<DD><CODE>java.lang.Exception</CODE></DL>
+</DD>
+</DL>
+<HR>
+
+<A NAME="testSignatureIssuerSerial()"><!-- --></A><H3>
+testSignatureIssuerSerial</H3>
+<PRE>
+public void <B>testSignatureIssuerSerial</B>()
+                               throws java.lang.Exception</PRE>
+<DL>
+<DD>Test signing a SOAP message using Issuer Serial. Note that this should fail, as the
+ trust-store does not contain the cert corresponding to wss40, only the CA cert
+ wss40CA.
+<P>
+<DD><DL>
+</DL>
+</DD>
+<DD><DL>
+
+<DT><B>Throws:</B>
+<DD><CODE>java.lang.Exception</CODE></DL>
+</DD>
+</DL>
+<HR>
+
+<A NAME="testSignatureBadCACert()"><!-- --></A><H3>
+testSignatureBadCACert</H3>
+<PRE>
+public void <B>testSignatureBadCACert</B>()
+                            throws java.lang.Exception</PRE>
+<DL>
+<DD>Test signing a SOAP message using a BST. The signature verification passes, but the trust
+ verification will fail as the CA cert is out of date.
+<P>
+<DD><DL>
+</DL>
+</DD>
+<DD><DL>
+
+<DT><B>Throws:</B>
+<DD><CODE>java.lang.Exception</CODE></DL>
+</DD>
+</DL>
+<HR>
+
+<A NAME="testMultipleCertsWSHandler()"><!-- --></A><H3>
+testMultipleCertsWSHandler</H3>
+<PRE>
+public void <B>testMultipleCertsWSHandler</B>()
+                                throws java.lang.Exception</PRE>
+<DL>
+<DD>A test for "SignatureAction does not set DigestAlgorithm on WSSecSignature instance"
+<P>
+<DD><DL>
+</DL>
+</DD>
+<DD><DL>
+
+<DT><B>Throws:</B>
+<DD><CODE>java.lang.Exception</CODE></DL>
+</DD>
+</DL>
+<HR>
+
+<A NAME="handle(javax.security.auth.callback.Callback[])"><!-- --></A><H3>
+handle</H3>
+<PRE>
+public void <B>handle</B>(javax.security.auth.callback.Callback[]&nbsp;callbacks)
+            throws java.io.IOException,
+                   javax.security.auth.callback.UnsupportedCallbackException</PRE>
+<DL>
+<DD><DL>
+<DT><B>Specified by:</B><DD><CODE>handle</CODE> in interface <CODE>javax.security.auth.callback.CallbackHandler</CODE></DL>
+</DD>
+<DD><DL>
+
+<DT><B>Throws:</B>
+<DD><CODE>java.io.IOException</CODE>
+<DD><CODE>javax.security.auth.callback.UnsupportedCallbackException</CODE></DL>
+</DD>
+</DL>
+<!-- ========= END OF CLASS DATA ========= -->
+<HR>
+
+
+<!-- ======= START OF BOTTOM NAVBAR ====== -->
+<A NAME="navbar_bottom"><!-- --></A>
+<A HREF="#skip-navbar_bottom" title="Skip navigation links"></A>
+<TABLE BORDER="0" WIDTH="100%" CELLPADDING="1" CELLSPACING="0" SUMMARY="">
+<TR>
+<TD COLSPAN=3 BGCOLOR="#EEEEFF" CLASS="NavBarCell1">
+<A NAME="navbar_bottom_firstrow"><!-- --></A>
+<TABLE BORDER="0" CELLPADDING="0" CELLSPACING="3" SUMMARY="">
+  <TR ALIGN="center" VALIGN="top">
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../overview-summary.html"><FONT CLASS="NavBarFont1"><B>Overview</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="package-summary.html"><FONT CLASS="NavBarFont1"><B>Package</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#FFFFFF" CLASS="NavBarCell1Rev"> &nbsp;<FONT CLASS="NavBarFont1Rev"><B>Class</B></FONT>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="class-use/TestWSSecurityWSS40.html"><FONT CLASS="NavBarFont1"><B>Use</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="package-tree.html"><FONT CLASS="NavBarFont1"><B>Tree</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../deprecated-list.html"><FONT CLASS="NavBarFont1"><B>Deprecated</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../index-all.html"><FONT CLASS="NavBarFont1"><B>Index</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../help-doc.html"><FONT CLASS="NavBarFont1"><B>Help</B></FONT></A>&nbsp;</TD>
+  </TR>
+</TABLE>
+</TD>
+<TD ALIGN="right" VALIGN="top" ROWSPAN=3><EM>
+</EM>
+</TD>
+</TR>
+
+<TR>
+<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
+&nbsp;<A HREF="../wssec/TestWSSecurityWSS245.MyCallbackHandler.html" title="class in wssec"><B>PREV CLASS</B></A>&nbsp;
+&nbsp;<A HREF="../wssec/TestWSSecurityWSS60.html" title="class in wssec"><B>NEXT CLASS</B></A></FONT></TD>
+<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
+  <A HREF="../index.html" target="_top"><B>FRAMES</B></A>  &nbsp;
+&nbsp;<A HREF="TestWSSecurityWSS40.html" target="_top"><B>NO FRAMES</B></A>  &nbsp;
+&nbsp;<SCRIPT type="text/javascript">
+  <!--
+  if(window==top) {
+    document.writeln('<A HREF="../allclasses-noframe.html"><B>All Classes</B></A>');
+  }
+  //-->
+</SCRIPT>
+<NOSCRIPT>
+  <A HREF="../allclasses-noframe.html"><B>All Classes</B></A>
+</NOSCRIPT>
+
+</FONT></TD>
+</TR>
+<TR>
+<TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2">
+  SUMMARY:&nbsp;NESTED&nbsp;|&nbsp;FIELD&nbsp;|&nbsp;<A HREF="#constructor_summary">CONSTR</A>&nbsp;|&nbsp;<A HREF="#method_summary">METHOD</A></FONT></TD>
+<TD VALIGN="top" CLASS="NavBarCell3"><FONT SIZE="-2">
+DETAIL:&nbsp;FIELD&nbsp;|&nbsp;<A HREF="#constructor_detail">CONSTR</A>&nbsp;|&nbsp;<A HREF="#method_detail">METHOD</A></FONT></TD>
+</TR>
+</TABLE>
+<A NAME="skip-navbar_bottom"></A>
+<!-- ======== END OF BOTTOM NAVBAR ======= -->
+
+<HR>
+Copyright &#169; 2004-2010 <a href="http://www.apache.org/">The Apache Software Foundation</a>. All Rights Reserved.
+</BODY>
+</HTML>

Added: webservices/wss4j/site/testapidocs/wssec/class-use/TestWSSecuritySAMLKeyIdentifier.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/testapidocs/wssec/class-use/TestWSSecuritySAMLKeyIdentifier.html?rev=1040462&view=auto
==============================================================================
--- webservices/wss4j/site/testapidocs/wssec/class-use/TestWSSecuritySAMLKeyIdentifier.html (added)
+++ webservices/wss4j/site/testapidocs/wssec/class-use/TestWSSecuritySAMLKeyIdentifier.html Tue Nov 30 11:11:34 2010
@@ -0,0 +1,137 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
+<!--NewPage-->
+<HTML>
+<HEAD>
+<!-- Generated by javadoc (build 1.4.2_19) on Thu Nov 25 12:48:16 GMT 2010 -->
+<META http-equiv="Content-Type" content="text/html; charset=UTF-8">
+<TITLE>
+Uses of Class wssec.TestWSSecuritySAMLKeyIdentifier (WSS4J 1.5.10 Test API)
+</TITLE>
+
+
+<LINK REL ="stylesheet" TYPE="text/css" HREF="../../stylesheet.css" TITLE="Style">
+
+<SCRIPT type="text/javascript">
+function windowTitle()
+{
+    parent.document.title="Uses of Class wssec.TestWSSecuritySAMLKeyIdentifier (WSS4J 1.5.10 Test API)";
+}
+</SCRIPT>
+
+</HEAD>
+
+<BODY BGCOLOR="white" onload="windowTitle();">
+
+
+<!-- ========= START OF TOP NAVBAR ======= -->
+<A NAME="navbar_top"><!-- --></A>
+<A HREF="#skip-navbar_top" title="Skip navigation links"></A>
+<TABLE BORDER="0" WIDTH="100%" CELLPADDING="1" CELLSPACING="0" SUMMARY="">
+<TR>
+<TD COLSPAN=3 BGCOLOR="#EEEEFF" CLASS="NavBarCell1">
+<A NAME="navbar_top_firstrow"><!-- --></A>
+<TABLE BORDER="0" CELLPADDING="0" CELLSPACING="3" SUMMARY="">
+  <TR ALIGN="center" VALIGN="top">
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../../overview-summary.html"><FONT CLASS="NavBarFont1"><B>Overview</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../package-summary.html"><FONT CLASS="NavBarFont1"><B>Package</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../../wssec/TestWSSecuritySAMLKeyIdentifier.html" title="class in wssec"><FONT CLASS="NavBarFont1"><B>Class</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#FFFFFF" CLASS="NavBarCell1Rev"> &nbsp;<FONT CLASS="NavBarFont1Rev"><B>Use</B></FONT>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../package-tree.html"><FONT CLASS="NavBarFont1"><B>Tree</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../../deprecated-list.html"><FONT CLASS="NavBarFont1"><B>Deprecated</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../../index-all.html"><FONT CLASS="NavBarFont1"><B>Index</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../../help-doc.html"><FONT CLASS="NavBarFont1"><B>Help</B></FONT></A>&nbsp;</TD>
+  </TR>
+</TABLE>
+</TD>
+<TD ALIGN="right" VALIGN="top" ROWSPAN=3><EM>
+</EM>
+</TD>
+</TR>
+
+<TR>
+<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
+&nbsp;PREV&nbsp;
+&nbsp;NEXT</FONT></TD>
+<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
+  <A HREF="../../index.html" target="_top"><B>FRAMES</B></A>  &nbsp;
+&nbsp;<A HREF="TestWSSecuritySAMLKeyIdentifier.html" target="_top"><B>NO FRAMES</B></A>  &nbsp;
+&nbsp;<SCRIPT type="text/javascript">
+  <!--
+  if(window==top) {
+    document.writeln('<A HREF="../../allclasses-noframe.html"><B>All Classes</B></A>');
+  }
+  //-->
+</SCRIPT>
+<NOSCRIPT>
+  <A HREF="../../allclasses-noframe.html"><B>All Classes</B></A>
+</NOSCRIPT>
+
+</FONT></TD>
+</TR>
+</TABLE>
+<A NAME="skip-navbar_top"></A>
+<!-- ========= END OF TOP NAVBAR ========= -->
+
+<HR>
+<CENTER>
+<H2>
+<B>Uses of Class<br>wssec.TestWSSecuritySAMLKeyIdentifier</B></H2>
+</CENTER>
+No usage of wssec.TestWSSecuritySAMLKeyIdentifier
+<P>
+<HR>
+
+
+<!-- ======= START OF BOTTOM NAVBAR ====== -->
+<A NAME="navbar_bottom"><!-- --></A>
+<A HREF="#skip-navbar_bottom" title="Skip navigation links"></A>
+<TABLE BORDER="0" WIDTH="100%" CELLPADDING="1" CELLSPACING="0" SUMMARY="">
+<TR>
+<TD COLSPAN=3 BGCOLOR="#EEEEFF" CLASS="NavBarCell1">
+<A NAME="navbar_bottom_firstrow"><!-- --></A>
+<TABLE BORDER="0" CELLPADDING="0" CELLSPACING="3" SUMMARY="">
+  <TR ALIGN="center" VALIGN="top">
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../../overview-summary.html"><FONT CLASS="NavBarFont1"><B>Overview</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../package-summary.html"><FONT CLASS="NavBarFont1"><B>Package</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../../wssec/TestWSSecuritySAMLKeyIdentifier.html" title="class in wssec"><FONT CLASS="NavBarFont1"><B>Class</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#FFFFFF" CLASS="NavBarCell1Rev"> &nbsp;<FONT CLASS="NavBarFont1Rev"><B>Use</B></FONT>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../package-tree.html"><FONT CLASS="NavBarFont1"><B>Tree</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../../deprecated-list.html"><FONT CLASS="NavBarFont1"><B>Deprecated</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../../index-all.html"><FONT CLASS="NavBarFont1"><B>Index</B></FONT></A>&nbsp;</TD>
+  <TD BGCOLOR="#EEEEFF" CLASS="NavBarCell1">    <A HREF="../../help-doc.html"><FONT CLASS="NavBarFont1"><B>Help</B></FONT></A>&nbsp;</TD>
+  </TR>
+</TABLE>
+</TD>
+<TD ALIGN="right" VALIGN="top" ROWSPAN=3><EM>
+</EM>
+</TD>
+</TR>
+
+<TR>
+<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
+&nbsp;PREV&nbsp;
+&nbsp;NEXT</FONT></TD>
+<TD BGCOLOR="white" CLASS="NavBarCell2"><FONT SIZE="-2">
+  <A HREF="../../index.html" target="_top"><B>FRAMES</B></A>  &nbsp;
+&nbsp;<A HREF="TestWSSecuritySAMLKeyIdentifier.html" target="_top"><B>NO FRAMES</B></A>  &nbsp;
+&nbsp;<SCRIPT type="text/javascript">
+  <!--
+  if(window==top) {
+    document.writeln('<A HREF="../../allclasses-noframe.html"><B>All Classes</B></A>');
+  }
+  //-->
+</SCRIPT>
+<NOSCRIPT>
+  <A HREF="../../allclasses-noframe.html"><B>All Classes</B></A>
+</NOSCRIPT>
+
+</FONT></TD>
+</TR>
+</TABLE>
+<A NAME="skip-navbar_bottom"></A>
+<!-- ======== END OF BOTTOM NAVBAR ======= -->
+
+<HR>
+Copyright &#169; 2004-2010 <a href="http://www.apache.org/">The Apache Software Foundation</a>. All Rights Reserved.
+</BODY>
+</HTML>

Added: webservices/wss4j/site/xref-test/wssec/TestWSSecuritySAMLKeyIdentifier.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref-test/wssec/TestWSSecuritySAMLKeyIdentifier.html?rev=1040462&view=auto
==============================================================================
--- webservices/wss4j/site/xref-test/wssec/TestWSSecuritySAMLKeyIdentifier.html (added)
+++ webservices/wss4j/site/xref-test/wssec/TestWSSecuritySAMLKeyIdentifier.html Tue Nov 30 11:11:34 2010
@@ -0,0 +1,225 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
+<title>TestWSSecuritySAMLKeyIdentifier xref</title>
+<link type="text/css" rel="stylesheet" href="../stylesheet.css" />
+</head>
+<body>
+<pre>
+
+<a name="1" href="#1">1</a>   <em class="jxr_comment">/*</em>
+<a name="2" href="#2">2</a>   <em class="jxr_comment"> * Copyright 2010 The Apache Software Foundation.</em>
+<a name="3" href="#3">3</a>   <em class="jxr_comment"> *</em>
+<a name="4" href="#4">4</a>   <em class="jxr_comment"> *  Licensed under the Apache License, Version 2.0 (the "License");</em>
+<a name="5" href="#5">5</a>   <em class="jxr_comment"> *  you may not use this file except in compliance with the License.</em>
+<a name="6" href="#6">6</a>   <em class="jxr_comment"> *  You may obtain a copy of the License at</em>
+<a name="7" href="#7">7</a>   <em class="jxr_comment"> *</em>
+<a name="8" href="#8">8</a>   <em class="jxr_comment"> *      <a href="http://www.apache.org/licenses/LICENSE-2.0" target="alexandria_uri">http://www.apache.org/licenses/LICENSE-2.0</a></em>
+<a name="9" href="#9">9</a>   <em class="jxr_comment"> *</em>
+<a name="10" href="#10">10</a>  <em class="jxr_comment"> *  Unless required by applicable law or agreed to in writing, software</em>
+<a name="11" href="#11">11</a>  <em class="jxr_comment"> *  distributed under the License is distributed on an "AS IS" BASIS,</em>
+<a name="12" href="#12">12</a>  <em class="jxr_comment"> *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.</em>
+<a name="13" href="#13">13</a>  <em class="jxr_comment"> *  See the License for the specific language governing permissions and</em>
+<a name="14" href="#14">14</a>  <em class="jxr_comment"> *  limitations under the License.</em>
+<a name="15" href="#15">15</a>  <em class="jxr_comment"> *</em>
+<a name="16" href="#16">16</a>  <em class="jxr_comment"> */</em>
+<a name="17" href="#17">17</a>  
+<a name="18" href="#18">18</a>  <strong class="jxr_keyword">package</strong> wssec;
+<a name="19" href="#19">19</a>  
+<a name="20" href="#20">20</a>  <strong class="jxr_keyword">import</strong> junit.framework.Test;
+<a name="21" href="#21">21</a>  <strong class="jxr_keyword">import</strong> junit.framework.TestCase;
+<a name="22" href="#22">22</a>  <strong class="jxr_keyword">import</strong> junit.framework.TestSuite;
+<a name="23" href="#23">23</a>  
+<a name="24" href="#24">24</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.SAMLIssuerFactory;
+<a name="25" href="#25">25</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.saml.SAMLIssuer;
+<a name="26" href="#26">26</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.WSSecurityUtil;
+<a name="27" href="#27">27</a>  
+<a name="28" href="#28">28</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.Message;
+<a name="29" href="#29">29</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.MessageContext;
+<a name="30" href="#30">30</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.client.AxisClient;
+<a name="31" href="#31">31</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.configuration.NullProvider;
+<a name="32" href="#32">32</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.message.SOAPEnvelope;
+<a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.logging.Log;
+<a name="34" href="#34">34</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.logging.LogFactory;
+<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSConstants;
+<a name="36" href="#36">36</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSEncryptionPart;
+<a name="37" href="#37">37</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSPasswordCallback;
+<a name="38" href="#38">38</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityEngine;
+<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityEngineResult;
+<a name="40" href="#40">40</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.components.crypto.Crypto;
+<a name="41" href="#41">41</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.components.crypto.CryptoFactory;
+<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecEncrypt;
+<a name="43" href="#43">43</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecHeader;
+<a name="44" href="#44">44</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.token.SecurityTokenReference;
+<a name="45" href="#45">45</a>  
+<a name="46" href="#46">46</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Document;
+<a name="47" href="#47">47</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Element;
+<a name="48" href="#48">48</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Node;
+<a name="49" href="#49">49</a>  
+<a name="50" href="#50">50</a>  <strong class="jxr_keyword">import</strong> org.opensaml.SAMLAssertion;
+<a name="51" href="#51">51</a>  
+<a name="52" href="#52">52</a>  <strong class="jxr_keyword">import</strong> java.io.ByteArrayInputStream;
+<a name="53" href="#53">53</a>  <strong class="jxr_keyword">import</strong> java.io.IOException;
+<a name="54" href="#54">54</a>  <strong class="jxr_keyword">import</strong> java.io.InputStream;
+<a name="55" href="#55">55</a>  <strong class="jxr_keyword">import</strong> java.util.Vector;
+<a name="56" href="#56">56</a>  
+<a name="57" href="#57">57</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.Callback;
+<a name="58" href="#58">58</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.CallbackHandler;
+<a name="59" href="#59">59</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.UnsupportedCallbackException;
+<a name="60" href="#60">60</a>  
+<a name="61" href="#61">61</a>  <em class="jxr_javadoccomment">/**</em>
+<a name="62" href="#62">62</a>  <em class="jxr_javadoccomment"> * Test-case for checking KeyIdentifier (and not Reference) elements </em>
+<a name="63" href="#63">63</a>  <em class="jxr_javadoccomment"> * are used to identify SAML tokens</em>
+<a name="64" href="#64">64</a>  <em class="jxr_javadoccomment"> * </em>
+<a name="65" href="#65">65</a>  <em class="jxr_javadoccomment"> */</em>
+<a name="66" href="#66">66</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> <a href="../wssec/TestWSSecuritySAMLKeyIdentifier.html">TestWSSecuritySAMLKeyIdentifier</a> <strong class="jxr_keyword">extends</strong> TestCase implements CallbackHandler {
+<a name="67" href="#67">67</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> Log LOG = LogFactory.getLog(TestWSSecuritySAMLKeyIdentifier.<strong class="jxr_keyword">class</strong>);
+<a name="68" href="#68">68</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> String SOAPMSG = 
+<a name="69" href="#69">69</a>          <span class="jxr_string">"&lt;?xml version=\&quot;1.0\&quot; encoding=\&quot;UTF-8\&quot;?&gt;"</span> 
+<a name="70" href="#70">70</a>          + <span class="jxr_string">"&lt;SOAP-ENV:Envelope "</span>
+<a name="71" href="#71">71</a>          +   <span class="jxr_string">"xmlns:SOAP-ENV=\&quot;http://schemas.xmlsoap.org/soap/envelope/\&quot; "</span>
+<a name="72" href="#72">72</a>          +   <span class="jxr_string">"xmlns:xsd=\&quot;http://www.w3.org/2001/XMLSchema\&quot; "</span>
+<a name="73" href="#73">73</a>          +   <span class="jxr_string">"xmlns:xsi=\&quot;http://www.w3.org/2001/XMLSchema-instance\&quot;&gt;"</span> 
+<a name="74" href="#74">74</a>          +   <span class="jxr_string">"&lt;SOAP-ENV:Body&gt;"</span> 
+<a name="75" href="#75">75</a>          +      <span class="jxr_string">"&lt;ns1:testMethod xmlns:ns1=\&quot;uri:LogTestService2\&quot;&gt;&lt;/ns1:testMethod&gt;"</span> 
+<a name="76" href="#76">76</a>          +   <span class="jxr_string">"&lt;/SOAP-ENV:Body&gt;"</span> 
+<a name="77" href="#77">77</a>          + <span class="jxr_string">"&lt;/SOAP-ENV:Envelope&gt;"</span>;
+<a name="78" href="#78">78</a>  
+<a name="79" href="#79">79</a>      <strong class="jxr_keyword">private</strong> WSSecurityEngine secEngine = <strong class="jxr_keyword">new</strong> WSSecurityEngine();
+<a name="80" href="#80">80</a>      <strong class="jxr_keyword">private</strong> MessageContext msgContext;
+<a name="81" href="#81">81</a>      <strong class="jxr_keyword">private</strong> Message message;
+<a name="82" href="#82">82</a>  
+<a name="83" href="#83">83</a>      <em class="jxr_javadoccomment">/**</em>
+<a name="84" href="#84">84</a>  <em class="jxr_javadoccomment">     * TestWSSecurity constructor</em>
+<a name="85" href="#85">85</a>  <em class="jxr_javadoccomment">     * </em>
+<a name="86" href="#86">86</a>  <em class="jxr_javadoccomment">     * @param name name of the test</em>
+<a name="87" href="#87">87</a>  <em class="jxr_javadoccomment">     */</em>
+<a name="88" href="#88">88</a>      <strong class="jxr_keyword">public</strong> <a href="../wssec/TestWSSecuritySAMLKeyIdentifier.html">TestWSSecuritySAMLKeyIdentifier</a>(String name) {
+<a name="89" href="#89">89</a>          <strong class="jxr_keyword">super</strong>(name);
+<a name="90" href="#90">90</a>      }
+<a name="91" href="#91">91</a>  
+<a name="92" href="#92">92</a>      <em class="jxr_javadoccomment">/**</em>
+<a name="93" href="#93">93</a>  <em class="jxr_javadoccomment">     * JUnit suite</em>
+<a name="94" href="#94">94</a>  <em class="jxr_javadoccomment">     * </em>
+<a name="95" href="#95">95</a>  <em class="jxr_javadoccomment">     * @return a junit test suite</em>
+<a name="96" href="#96">96</a>  <em class="jxr_javadoccomment">     */</em>
+<a name="97" href="#97">97</a>      <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> Test suite() {
+<a name="98" href="#98">98</a>          <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> TestSuite(TestWSSecuritySAMLKeyIdentifier.<strong class="jxr_keyword">class</strong>);
+<a name="99" href="#99">99</a>      }
+<a name="100" href="#100">100</a> 
+<a name="101" href="#101">101</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="102" href="#102">102</a> <em class="jxr_javadoccomment">     * Setup method</em>
+<a name="103" href="#103">103</a> <em class="jxr_javadoccomment">     * </em>
+<a name="104" href="#104">104</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is a problem in setup</em>
+<a name="105" href="#105">105</a> <em class="jxr_javadoccomment">     */</em>
+<a name="106" href="#106">106</a>     <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">void</strong> setUp() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="107" href="#107">107</a>         AxisClient tmpEngine = <strong class="jxr_keyword">new</strong> AxisClient(<strong class="jxr_keyword">new</strong> NullProvider());
+<a name="108" href="#108">108</a>         msgContext = <strong class="jxr_keyword">new</strong> MessageContext(tmpEngine);
+<a name="109" href="#109">109</a>         message = getSOAPMessage();
+<a name="110" href="#110">110</a>     }
+<a name="111" href="#111">111</a> 
+<a name="112" href="#112">112</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="113" href="#113">113</a> <em class="jxr_javadoccomment">     * Constructs a soap envelope</em>
+<a name="114" href="#114">114</a> <em class="jxr_javadoccomment">     * </em>
+<a name="115" href="#115">115</a> <em class="jxr_javadoccomment">     * @return soap envelope</em>
+<a name="116" href="#116">116</a> <em class="jxr_javadoccomment">     * @throws Exception if there is any problem constructing the soap envelope</em>
+<a name="117" href="#117">117</a> <em class="jxr_javadoccomment">     */</em>
+<a name="118" href="#118">118</a>     <strong class="jxr_keyword">protected</strong> Message getSOAPMessage() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="119" href="#119">119</a>         InputStream in = <strong class="jxr_keyword">new</strong> ByteArrayInputStream(SOAPMSG.getBytes());
+<a name="120" href="#120">120</a>         Message msg = <strong class="jxr_keyword">new</strong> Message(in);
+<a name="121" href="#121">121</a>         msg.setMessageContext(msgContext);
+<a name="122" href="#122">122</a>         <strong class="jxr_keyword">return</strong> msg;
+<a name="123" href="#123">123</a>     }
+<a name="124" href="#124">124</a> 
+<a name="125" href="#125">125</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="126" href="#126">126</a> <em class="jxr_javadoccomment">     * The body of the SOAP request is encrypted using a secret key, which is in turn encrypted</em>
+<a name="127" href="#127">127</a> <em class="jxr_javadoccomment">     * using the certificate embedded in the SAML assertion and referenced using a Key Identifier.</em>
+<a name="128" href="#128">128</a> <em class="jxr_javadoccomment">     */</em>
+<a name="129" href="#129">129</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSAMLEncryptedKey() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="130" href="#130">130</a>         SOAPEnvelope unsignedEnvelope = message.getSOAPEnvelope();
+<a name="131" href="#131">131</a>         
+<a name="132" href="#132">132</a>         <em class="jxr_comment">// Create a SAML assertion</em>
+<a name="133" href="#133">133</a>         SAMLIssuer saml = SAMLIssuerFactory.getInstance(<span class="jxr_string">"saml4.properties"</span>);
+<a name="134" href="#134">134</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="135" href="#135">135</a>         saml.setInstanceDoc(doc);
+<a name="136" href="#136">136</a>         Crypto hokCrypto = CryptoFactory.getInstance(<span class="jxr_string">"crypto.properties"</span>);
+<a name="137" href="#137">137</a>         saml.setUserCrypto(hokCrypto);
+<a name="138" href="#138">138</a>         saml.setUsername(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>);
+<a name="139" href="#139">139</a>         SAMLAssertion assertion = saml.newAssertion();
+<a name="140" href="#140">140</a>         Node assertionNode = assertion.toDOM(doc);
+<a name="141" href="#141">141</a>         
+<a name="142" href="#142">142</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="143" href="#143">143</a>         secHeader.insertSecurityHeader(doc);
+<a name="144" href="#144">144</a>         secHeader.getSecurityHeader().appendChild(assertionNode);
+<a name="145" href="#145">145</a>         
+<a name="146" href="#146">146</a>         <em class="jxr_comment">// Encrypt the SOAP body</em>
+<a name="147" href="#147">147</a>         WSSecEncrypt builder = <strong class="jxr_keyword">new</strong> WSSecEncrypt();
+<a name="148" href="#148">148</a>         builder.setUserInfo(<span class="jxr_string">"16c73ab6-b892-458f-abf5-2f875f74882e"</span>);
+<a name="149" href="#149">149</a>         builder.setSymmetricEncAlgorithm(WSConstants.TRIPLE_DES);
+<a name="150" href="#150">150</a>         builder.setKeyIdentifierType(WSConstants.CUSTOM_KEY_IDENTIFIER);
+<a name="151" href="#151">151</a>         builder.setCustomEKTokenValueType(SecurityTokenReference.SAML_ID_URI);
+<a name="152" href="#152">152</a>         builder.setCustomEKTokenId(assertion.getId());
+<a name="153" href="#153">153</a>         
+<a name="154" href="#154">154</a>         builder.prepare(doc, hokCrypto);
+<a name="155" href="#155">155</a>         Vector parts = <strong class="jxr_keyword">new</strong> Vector();
+<a name="156" href="#156">156</a>         WSEncryptionPart encP = <strong class="jxr_keyword">new</strong> WSEncryptionPart(<span class="jxr_string">"testMethod"</span>, <span class="jxr_string">"uri:LogTestService2"</span>, <span class="jxr_string">"Element"</span>);
+<a name="157" href="#157">157</a>         parts.add(encP);
+<a name="158" href="#158">158</a>         Element refElement = builder.encryptForInternalRef(<strong class="jxr_keyword">null</strong>, parts);
+<a name="159" href="#159">159</a>         builder.addInternalRefElement(refElement);
+<a name="160" href="#160">160</a>         builder.appendToHeader(secHeader);
+<a name="161" href="#161">161</a> 
+<a name="162" href="#162">162</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="163" href="#163">163</a>             LOG.debug(<span class="jxr_string">"Signed SAML message (HOK):"</span>);
+<a name="164" href="#164">164</a>             String outputString = 
+<a name="165" href="#165">165</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
+<a name="166" href="#166">166</a>             LOG.debug(outputString);
+<a name="167" href="#167">167</a>         }
+<a name="168" href="#168">168</a>         
+<a name="169" href="#169">169</a>         Vector results = verify(doc, hokCrypto);
+<a name="170" href="#170">170</a>         WSSecurityEngineResult actionResult =
+<a name="171" href="#171">171</a>             WSSecurityUtil.fetchActionResult(results, WSConstants.ST_UNSIGNED);
+<a name="172" href="#172">172</a>         SAMLAssertion receivedAssertion = 
+<a name="173" href="#173">173</a>             (SAMLAssertion) actionResult.get(WSSecurityEngineResult.TAG_SAML_ASSERTION);
+<a name="174" href="#174">174</a>         assertTrue(receivedAssertion != <strong class="jxr_keyword">null</strong>);
+<a name="175" href="#175">175</a>     }
+<a name="176" href="#176">176</a>     
+<a name="177" href="#177">177</a>     
+<a name="178" href="#178">178</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="179" href="#179">179</a> <em class="jxr_javadoccomment">     * Verifies the soap envelope</em>
+<a name="180" href="#180">180</a> <em class="jxr_javadoccomment">     * </em>
+<a name="181" href="#181">181</a> <em class="jxr_javadoccomment">     * @param doc</em>
+<a name="182" href="#182">182</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is a problem in verification</em>
+<a name="183" href="#183">183</a> <em class="jxr_javadoccomment">     */</em>
+<a name="184" href="#184">184</a>     <strong class="jxr_keyword">private</strong> Vector verify(Document doc, Crypto verifyCrypto) <strong class="jxr_keyword">throws</strong> Exception {
+<a name="185" href="#185">185</a>         Vector results = secEngine.processSecurityHeader(doc, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">this</strong>, verifyCrypto);
+<a name="186" href="#186">186</a>         String outputString = 
+<a name="187" href="#187">187</a>             org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
+<a name="188" href="#188">188</a>         assertTrue(outputString.indexOf(<span class="jxr_string">"LogTestService2"</span>) &gt; 0 ? <strong class="jxr_keyword">true</strong> : false);
+<a name="189" href="#189">189</a>         <strong class="jxr_keyword">return</strong> results;
+<a name="190" href="#190">190</a>     }
+<a name="191" href="#191">191</a> 
+<a name="192" href="#192">192</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> handle(Callback[] callbacks)
+<a name="193" href="#193">193</a>         <strong class="jxr_keyword">throws</strong> IOException, UnsupportedCallbackException {
+<a name="194" href="#194">194</a>         <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> i = 0; i &lt; callbacks.length; i++) {
+<a name="195" href="#195">195</a>             <strong class="jxr_keyword">if</strong> (callbacks[i] instanceof WSPasswordCallback) {
+<a name="196" href="#196">196</a>                 WSPasswordCallback pc = (WSPasswordCallback) callbacks[i];
+<a name="197" href="#197">197</a>                 <em class="jxr_comment">/*</em>
+<a name="198" href="#198">198</a> <em class="jxr_comment">                 * here call a function/method to lookup the password for</em>
+<a name="199" href="#199">199</a> <em class="jxr_comment">                 * the given identifier (e.g. a user name or keystore alias)</em>
+<a name="200" href="#200">200</a> <em class="jxr_comment">                 * e.g.: pc.setPassword(passStore.getPassword(pc.getIdentfifier))</em>
+<a name="201" href="#201">201</a> <em class="jxr_comment">                 * for Testing we supply a fixed name here.</em>
+<a name="202" href="#202">202</a> <em class="jxr_comment">                 */</em>
+<a name="203" href="#203">203</a>                 pc.setPassword(<span class="jxr_string">"security"</span>);
+<a name="204" href="#204">204</a>             } <strong class="jxr_keyword">else</strong> {
+<a name="205" href="#205">205</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> UnsupportedCallbackException(callbacks[i], <span class="jxr_string">"Unrecognized Callback"</span>);
+<a name="206" href="#206">206</a>             }
+<a name="207" href="#207">207</a>         }
+<a name="208" href="#208">208</a>     }
+<a name="209" href="#209">209</a>     
+<a name="210" href="#210">210</a>     
+<a name="211" href="#211">211</a> }
+</pre>
+<hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
+</html>
+

Added: webservices/wss4j/site/xref-test/wssec/TestWSSecurityWSS40.html
URL: http://svn.apache.org/viewvc/webservices/wss4j/site/xref-test/wssec/TestWSSecurityWSS40.html?rev=1040462&view=auto
==============================================================================
--- webservices/wss4j/site/xref-test/wssec/TestWSSecurityWSS40.html (added)
+++ webservices/wss4j/site/xref-test/wssec/TestWSSecurityWSS40.html Tue Nov 30 11:11:34 2010
@@ -0,0 +1,384 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
+<title>TestWSSecurityWSS40 xref</title>
+<link type="text/css" rel="stylesheet" href="../stylesheet.css" />
+</head>
+<body>
+<pre>
+
+<a name="1" href="#1">1</a>   <em class="jxr_javadoccomment">/**</em>
+<a name="2" href="#2">2</a>   <em class="jxr_javadoccomment"> * Licensed to the Apache Software Foundation (ASF) under one</em>
+<a name="3" href="#3">3</a>   <em class="jxr_javadoccomment"> * or more contributor license agreements. See the NOTICE file</em>
+<a name="4" href="#4">4</a>   <em class="jxr_javadoccomment"> * distributed with this work for additional information</em>
+<a name="5" href="#5">5</a>   <em class="jxr_javadoccomment"> * regarding copyright ownership. The ASF licenses this file</em>
+<a name="6" href="#6">6</a>   <em class="jxr_javadoccomment"> * to you under the Apache License, Version 2.0 (the</em>
+<a name="7" href="#7">7</a>   <em class="jxr_javadoccomment"> * "License"); you may not use this file except in compliance</em>
+<a name="8" href="#8">8</a>   <em class="jxr_javadoccomment"> * with the License. You may obtain a copy of the License at</em>
+<a name="9" href="#9">9</a>   <em class="jxr_javadoccomment"> *</em>
+<a name="10" href="#10">10</a>  <em class="jxr_javadoccomment"> * <a href="http://www.apache.org/licenses/LICENSE-2.0" target="alexandria_uri">http://www.apache.org/licenses/LICENSE-2.0</a></em>
+<a name="11" href="#11">11</a>  <em class="jxr_javadoccomment"> *</em>
+<a name="12" href="#12">12</a>  <em class="jxr_javadoccomment"> * Unless required by applicable law or agreed to in writing,</em>
+<a name="13" href="#13">13</a>  <em class="jxr_javadoccomment"> * software distributed under the License is distributed on an</em>
+<a name="14" href="#14">14</a>  <em class="jxr_javadoccomment"> * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY</em>
+<a name="15" href="#15">15</a>  <em class="jxr_javadoccomment"> * KIND, either express or implied. See the License for the</em>
+<a name="16" href="#16">16</a>  <em class="jxr_javadoccomment"> * specific language governing permissions and limitations</em>
+<a name="17" href="#17">17</a>  <em class="jxr_javadoccomment"> * under the License.</em>
+<a name="18" href="#18">18</a>  <em class="jxr_javadoccomment"> */</em>
+<a name="19" href="#19">19</a>  
+<a name="20" href="#20">20</a>  <strong class="jxr_keyword">package</strong> wssec;
+<a name="21" href="#21">21</a>  
+<a name="22" href="#22">22</a>  <strong class="jxr_keyword">import</strong> junit.framework.Test;
+<a name="23" href="#23">23</a>  <strong class="jxr_keyword">import</strong> junit.framework.TestCase;
+<a name="24" href="#24">24</a>  <strong class="jxr_keyword">import</strong> junit.framework.TestSuite;
+<a name="25" href="#25">25</a>  
+<a name="26" href="#26">26</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.Message;
+<a name="27" href="#27">27</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.MessageContext;
+<a name="28" href="#28">28</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.client.AxisClient;
+<a name="29" href="#29">29</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.configuration.NullProvider;
+<a name="30" href="#30">30</a>  <strong class="jxr_keyword">import</strong> org.apache.axis.message.SOAPEnvelope;
+<a name="31" href="#31">31</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.logging.Log;
+<a name="32" href="#32">32</a>  <strong class="jxr_keyword">import</strong> org.apache.commons.logging.LogFactory;
+<a name="33" href="#33">33</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSPasswordCallback;
+<a name="34" href="#34">34</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSConfig;
+<a name="35" href="#35">35</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityEngine;
+<a name="36" href="#36">36</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSConstants;
+<a name="37" href="#37">37</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityEngineResult;
+<a name="38" href="#38">38</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.WSSecurityException;
+<a name="39" href="#39">39</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.components.crypto.Crypto;
+<a name="40" href="#40">40</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.components.crypto.CryptoFactory;
+<a name="41" href="#41">41</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.handler.RequestData;
+<a name="42" href="#42">42</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.handler.WSHandlerConstants;
+<a name="43" href="#43">43</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecSignature;
+<a name="44" href="#44">44</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.message.WSSecHeader;
+<a name="45" href="#45">45</a>  <strong class="jxr_keyword">import</strong> org.apache.ws.security.util.WSSecurityUtil;
+<a name="46" href="#46">46</a>  <strong class="jxr_keyword">import</strong> org.w3c.dom.Document;
+<a name="47" href="#47">47</a>  
+<a name="48" href="#48">48</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.Callback;
+<a name="49" href="#49">49</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.CallbackHandler;
+<a name="50" href="#50">50</a>  <strong class="jxr_keyword">import</strong> javax.security.auth.callback.UnsupportedCallbackException;
+<a name="51" href="#51">51</a>  
+<a name="52" href="#52">52</a>  <strong class="jxr_keyword">import</strong> java.io.ByteArrayInputStream;
+<a name="53" href="#53">53</a>  <strong class="jxr_keyword">import</strong> java.io.IOException;
+<a name="54" href="#54">54</a>  <strong class="jxr_keyword">import</strong> java.io.InputStream;
+<a name="55" href="#55">55</a>  <strong class="jxr_keyword">import</strong> java.security.cert.X509Certificate;
+<a name="56" href="#56">56</a>  <strong class="jxr_keyword">import</strong> java.util.Vector;
+<a name="57" href="#57">57</a>  
+<a name="58" href="#58">58</a>  <em class="jxr_javadoccomment">/**</em>
+<a name="59" href="#59">59</a>  <em class="jxr_javadoccomment"> * This is a test for WSS-40. Essentially it just tests that a message is signed using a</em>
+<a name="60" href="#60">60</a>  <em class="jxr_javadoccomment"> * keyEntry from one keystore, and verified at the other end with a keystore with just the</em>
+<a name="61" href="#61">61</a>  <em class="jxr_javadoccomment"> * CA cert in it.</em>
+<a name="62" href="#62">62</a>  <em class="jxr_javadoccomment"> * </em>
+<a name="63" href="#63">63</a>  <em class="jxr_javadoccomment"> * <a href="http://issues.apache.org/jira/browse/WSS-40" target="alexandria_uri">http://issues.apache.org/jira/browse/WSS-40</a></em>
+<a name="64" href="#64">64</a>  <em class="jxr_javadoccomment"> * </em>
+<a name="65" href="#65">65</a>  <em class="jxr_javadoccomment"> * Generate the CA keys/certs + export the CA cert to a keystore</em>
+<a name="66" href="#66">66</a>  <em class="jxr_javadoccomment"> * </em>
+<a name="67" href="#67">67</a>  <em class="jxr_javadoccomment"> * openssl req -x509 -newkey rsa:1024 -keyout wss40CAKey.pem -out wss40CA.pem </em>
+<a name="68" href="#68">68</a>  <em class="jxr_javadoccomment"> * -config ca.config -days 3650</em>
+<a name="69" href="#69">69</a>  <em class="jxr_javadoccomment"> * openssl x509 -outform DER -in wss40CA.pem -out wss40CA.crt</em>
+<a name="70" href="#70">70</a>  <em class="jxr_javadoccomment"> * keytool -import -file wss40CA.crt -alias wss40CA -keystore wss40CA.jks</em>
+<a name="71" href="#71">71</a>  <em class="jxr_javadoccomment"> * </em>
+<a name="72" href="#72">72</a>  <em class="jxr_javadoccomment"> * Generate the client keypair, make a csr, sign it with the CA key</em>
+<a name="73" href="#73">73</a>  <em class="jxr_javadoccomment"> * </em>
+<a name="74" href="#74">74</a>  <em class="jxr_javadoccomment"> * keytool -genkey -validity 3650 -alias wss40 -keyalg RSA -keystore wss40.jks </em>
+<a name="75" href="#75">75</a>  <em class="jxr_javadoccomment"> * -dname "CN=Colm,OU=WSS4J,O=Apache,L=Dublin,ST=Leinster,C=IE"</em>
+<a name="76" href="#76">76</a>  <em class="jxr_javadoccomment"> * keytool -certreq -alias wss40 -keystore wss40.jks -file wss40.cer</em>
+<a name="77" href="#77">77</a>  <em class="jxr_javadoccomment"> * openssl ca -config ca.config -policy policy_anything -days 3650 -out wss40.pem </em>
+<a name="78" href="#78">78</a>  <em class="jxr_javadoccomment"> * -infiles wss40.cer</em>
+<a name="79" href="#79">79</a>  <em class="jxr_javadoccomment"> * openssl x509 -outform DER -in wss40.pem -out wss40.crt</em>
+<a name="80" href="#80">80</a>  <em class="jxr_javadoccomment"> * </em>
+<a name="81" href="#81">81</a>  <em class="jxr_javadoccomment"> * Import the CA cert into wss40.jks and import the new signed certificate</em>
+<a name="82" href="#82">82</a>  <em class="jxr_javadoccomment"> * </em>
+<a name="83" href="#83">83</a>  <em class="jxr_javadoccomment"> * keytool -import -file wss40CA.crt -alias wss40CA -keystore wss40.jks</em>
+<a name="84" href="#84">84</a>  <em class="jxr_javadoccomment"> * keytool -import -file wss40.crt -alias wss40 -keystore wss40.jks</em>
+<a name="85" href="#85">85</a>  <em class="jxr_javadoccomment"> * </em>
+<a name="86" href="#86">86</a>  <em class="jxr_javadoccomment"> */</em>
+<a name="87" href="#87">87</a>  <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">class</strong> TestWSSecurityWSS40 <strong class="jxr_keyword">extends</strong> TestCase implements CallbackHandler {
+<a name="88" href="#88">88</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> Log LOG = LogFactory.getLog(TestWSSecurityWSS40.<strong class="jxr_keyword">class</strong>);
+<a name="89" href="#89">89</a>      <strong class="jxr_keyword">private</strong> <strong class="jxr_keyword">static</strong> <strong class="jxr_keyword">final</strong> String SOAPMSG = 
+<a name="90" href="#90">90</a>          <span class="jxr_string">"&lt;?xml version=\&quot;1.0\&quot; encoding=\&quot;UTF-8\&quot;?&gt;"</span> 
+<a name="91" href="#91">91</a>          + <span class="jxr_string">"&lt;SOAP-ENV:Envelope "</span>
+<a name="92" href="#92">92</a>          +   <span class="jxr_string">"xmlns:SOAP-ENV=\&quot;http://schemas.xmlsoap.org/soap/envelope/\&quot; "</span>
+<a name="93" href="#93">93</a>          +   <span class="jxr_string">"xmlns:xsd=\&quot;http://www.w3.org/2001/XMLSchema\&quot; "</span>
+<a name="94" href="#94">94</a>          +   <span class="jxr_string">"xmlns:xsi=\&quot;http://www.w3.org/2001/XMLSchema-instance\&quot;&gt;"</span> 
+<a name="95" href="#95">95</a>          +   <span class="jxr_string">"&lt;SOAP-ENV:Body&gt;"</span> 
+<a name="96" href="#96">96</a>          +       <span class="jxr_string">"&lt;add xmlns=\&quot;http://ws.apache.org/counter/counter_port_type\&quot;&gt;"</span> 
+<a name="97" href="#97">97</a>          +           <span class="jxr_string">"&lt;value xmlns=\&quot;\&quot;&gt;15&lt;/value&gt;"</span> 
+<a name="98" href="#98">98</a>          +       <span class="jxr_string">"&lt;/add&gt;"</span> 
+<a name="99" href="#99">99</a>          +   <span class="jxr_string">"&lt;/SOAP-ENV:Body&gt;"</span> 
+<a name="100" href="#100">100</a>         + <span class="jxr_string">"&lt;/SOAP-ENV:Envelope&gt;"</span>;
+<a name="101" href="#101">101</a>     <strong class="jxr_keyword">private</strong> WSSecurityEngine secEngine = <strong class="jxr_keyword">new</strong> WSSecurityEngine();
+<a name="102" href="#102">102</a>     <strong class="jxr_keyword">private</strong> Crypto crypto = CryptoFactory.getInstance(<span class="jxr_string">"wss40.properties"</span>);
+<a name="103" href="#103">103</a>     <strong class="jxr_keyword">private</strong> Crypto cryptoCA = CryptoFactory.getInstance(<span class="jxr_string">"wss40CA.properties"</span>);
+<a name="104" href="#104">104</a>     <strong class="jxr_keyword">private</strong> MessageContext msgContext;
+<a name="105" href="#105">105</a>     <strong class="jxr_keyword">private</strong> SOAPEnvelope unsignedEnvelope;
+<a name="106" href="#106">106</a> 
+<a name="107" href="#107">107</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="108" href="#108">108</a> <em class="jxr_javadoccomment">     * TestWSSecurity constructor</em>
+<a name="109" href="#109">109</a> <em class="jxr_javadoccomment">     * </em>
+<a name="110" href="#110">110</a> <em class="jxr_javadoccomment">     * @param name name of the test</em>
+<a name="111" href="#111">111</a> <em class="jxr_javadoccomment">     */</em>
+<a name="112" href="#112">112</a>     <strong class="jxr_keyword">public</strong> TestWSSecurityWSS40(String name) {
+<a name="113" href="#113">113</a>         <strong class="jxr_keyword">super</strong>(name);
+<a name="114" href="#114">114</a>     }
+<a name="115" href="#115">115</a> 
+<a name="116" href="#116">116</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="117" href="#117">117</a> <em class="jxr_javadoccomment">     * JUnit suite</em>
+<a name="118" href="#118">118</a> <em class="jxr_javadoccomment">     * </em>
+<a name="119" href="#119">119</a> <em class="jxr_javadoccomment">     * @return a junit test suite</em>
+<a name="120" href="#120">120</a> <em class="jxr_javadoccomment">     */</em>
+<a name="121" href="#121">121</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">static</strong> Test suite() {
+<a name="122" href="#122">122</a>         <strong class="jxr_keyword">return</strong> <strong class="jxr_keyword">new</strong> TestSuite(TestWSSecurityWSS40.<strong class="jxr_keyword">class</strong>);
+<a name="123" href="#123">123</a>     }
+<a name="124" href="#124">124</a>     
+<a name="125" href="#125">125</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="126" href="#126">126</a> <em class="jxr_javadoccomment">     * Setup method</em>
+<a name="127" href="#127">127</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="128" href="#128">128</a> <em class="jxr_javadoccomment">     * </em>
+<a name="129" href="#129">129</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception Thrown when there is a problem in setup</em>
+<a name="130" href="#130">130</a> <em class="jxr_javadoccomment">     */</em>
+<a name="131" href="#131">131</a>     <strong class="jxr_keyword">protected</strong> <strong class="jxr_keyword">void</strong> setUp() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="132" href="#132">132</a>         AxisClient tmpEngine = <strong class="jxr_keyword">new</strong> AxisClient(<strong class="jxr_keyword">new</strong> NullProvider());
+<a name="133" href="#133">133</a>         msgContext = <strong class="jxr_keyword">new</strong> MessageContext(tmpEngine);
+<a name="134" href="#134">134</a>         unsignedEnvelope = getSOAPEnvelope();
+<a name="135" href="#135">135</a>     }
+<a name="136" href="#136">136</a>     
+<a name="137" href="#137">137</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="138" href="#138">138</a> <em class="jxr_javadoccomment">     * Constructs a soap envelope</em>
+<a name="139" href="#139">139</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="140" href="#140">140</a> <em class="jxr_javadoccomment">     * </em>
+<a name="141" href="#141">141</a> <em class="jxr_javadoccomment">     * @return soap envelope</em>
+<a name="142" href="#142">142</a> <em class="jxr_javadoccomment">     * @throws java.lang.Exception if there is any problem constructing the soap envelope</em>
+<a name="143" href="#143">143</a> <em class="jxr_javadoccomment">     */</em>
+<a name="144" href="#144">144</a>     <strong class="jxr_keyword">protected</strong> SOAPEnvelope getSOAPEnvelope() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="145" href="#145">145</a>         InputStream in = <strong class="jxr_keyword">new</strong> ByteArrayInputStream(SOAPMSG.getBytes());
+<a name="146" href="#146">146</a>         Message msg = <strong class="jxr_keyword">new</strong> Message(in);
+<a name="147" href="#147">147</a>         msg.setMessageContext(msgContext);
+<a name="148" href="#148">148</a>         <strong class="jxr_keyword">return</strong> msg.getSOAPEnvelope();
+<a name="149" href="#149">149</a>     }
+<a name="150" href="#150">150</a> 
+<a name="151" href="#151">151</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="152" href="#152">152</a> <em class="jxr_javadoccomment">     * Test signing a SOAP message using a BST.</em>
+<a name="153" href="#153">153</a> <em class="jxr_javadoccomment">     */</em>
+<a name="154" href="#154">154</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSignatureDirectReference() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="155" href="#155">155</a>         WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature();
+<a name="156" href="#156">156</a>         sign.setUserInfo(<span class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>);
+<a name="157" href="#157">157</a>         sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
+<a name="158" href="#158">158</a> 
+<a name="159" href="#159">159</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="160" href="#160">160</a> 
+<a name="161" href="#161">161</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="162" href="#162">162</a>         secHeader.insertSecurityHeader(doc);
+<a name="163" href="#163">163</a>         Document signedDoc = sign.build(doc, crypto, secHeader);
+<a name="164" href="#164">164</a>         
+<a name="165" href="#165">165</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="166" href="#166">166</a>             String outputString = 
+<a name="167" href="#167">167</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
+<a name="168" href="#168">168</a>             LOG.debug(outputString);
+<a name="169" href="#169">169</a>         }
+<a name="170" href="#170">170</a>         <em class="jxr_comment">//</em>
+<a name="171" href="#171">171</a>         <em class="jxr_comment">// Verify the signature</em>
+<a name="172" href="#172">172</a>         <em class="jxr_comment">//</em>
+<a name="173" href="#173">173</a>         Vector results = verify(signedDoc, cryptoCA);
+<a name="174" href="#174">174</a>         WSSecurityEngineResult result = 
+<a name="175" href="#175">175</a>             WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN);
+<a name="176" href="#176">176</a>         X509Certificate cert = 
+<a name="177" href="#177">177</a>             (X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
+<a name="178" href="#178">178</a>         assertTrue (cert != <strong class="jxr_keyword">null</strong>);
+<a name="179" href="#179">179</a>         
+<a name="180" href="#180">180</a>         <em class="jxr_comment">// There should be no certificate chain for this example</em>
+<a name="181" href="#181">181</a>         X509Certificate[] certs = 
+<a name="182" href="#182">182</a>             (X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES);
+<a name="183" href="#183">183</a>         assertTrue (certs == <strong class="jxr_keyword">null</strong>);
+<a name="184" href="#184">184</a>     }
+<a name="185" href="#185">185</a>     
+<a name="186" href="#186">186</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="187" href="#187">187</a> <em class="jxr_javadoccomment">     * Test signing a SOAP message using a BST, sending the CA cert as well in the</em>
+<a name="188" href="#188">188</a> <em class="jxr_javadoccomment">     * message.</em>
+<a name="189" href="#189">189</a> <em class="jxr_javadoccomment">     */</em>
+<a name="190" href="#190">190</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSignatureDirectReferenceCACert() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="191" href="#191">191</a>         WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature();
+<a name="192" href="#192">192</a>         sign.setUserInfo(<span class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>);
+<a name="193" href="#193">193</a>         sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
+<a name="194" href="#194">194</a>         sign.setUseSingleCertificate(false);
+<a name="195" href="#195">195</a> 
+<a name="196" href="#196">196</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="197" href="#197">197</a> 
+<a name="198" href="#198">198</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="199" href="#199">199</a>         secHeader.insertSecurityHeader(doc);
+<a name="200" href="#200">200</a>         Document signedDoc = sign.build(doc, crypto, secHeader);
+<a name="201" href="#201">201</a>         
+<a name="202" href="#202">202</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="203" href="#203">203</a>             String outputString = 
+<a name="204" href="#204">204</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
+<a name="205" href="#205">205</a>             LOG.debug(<span class="jxr_string">"BST CA Cert"</span>);
+<a name="206" href="#206">206</a>             LOG.debug(outputString);
+<a name="207" href="#207">207</a>         }
+<a name="208" href="#208">208</a>         <em class="jxr_comment">//</em>
+<a name="209" href="#209">209</a>         <em class="jxr_comment">// Verify the signature</em>
+<a name="210" href="#210">210</a>         <em class="jxr_comment">//</em>
+<a name="211" href="#211">211</a>         Vector results = verify(signedDoc, cryptoCA);
+<a name="212" href="#212">212</a>         WSSecurityEngineResult result = 
+<a name="213" href="#213">213</a>             WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN);
+<a name="214" href="#214">214</a>         X509Certificate cert = 
+<a name="215" href="#215">215</a>             (X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
+<a name="216" href="#216">216</a>         assertTrue (cert != <strong class="jxr_keyword">null</strong>);
+<a name="217" href="#217">217</a>         X509Certificate[] certs = 
+<a name="218" href="#218">218</a>             (X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES);
+<a name="219" href="#219">219</a>         assertTrue (certs != <strong class="jxr_keyword">null</strong> &amp;&amp; certs.length == 2);
+<a name="220" href="#220">220</a>     }
+<a name="221" href="#221">221</a>     
+<a name="222" href="#222">222</a>     
+<a name="223" href="#223">223</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="224" href="#224">224</a> <em class="jxr_javadoccomment">     * Test signing a SOAP message using Issuer Serial. Note that this should fail, as the</em>
+<a name="225" href="#225">225</a> <em class="jxr_javadoccomment">     * trust-store does not contain the cert corresponding to wss40, only the CA cert</em>
+<a name="226" href="#226">226</a> <em class="jxr_javadoccomment">     * wss40CA.</em>
+<a name="227" href="#227">227</a> <em class="jxr_javadoccomment">     */</em>
+<a name="228" href="#228">228</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSignatureIssuerSerial() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="229" href="#229">229</a>         WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature();
+<a name="230" href="#230">230</a>         sign.setUserInfo(<span class="jxr_string">"wss40"</span>, <span class="jxr_string">"security"</span>);
+<a name="231" href="#231">231</a>         sign.setKeyIdentifierType(WSConstants.ISSUER_SERIAL);
+<a name="232" href="#232">232</a> 
+<a name="233" href="#233">233</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="234" href="#234">234</a> 
+<a name="235" href="#235">235</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="236" href="#236">236</a>         secHeader.insertSecurityHeader(doc);
+<a name="237" href="#237">237</a>         Document signedDoc = sign.build(doc, crypto, secHeader);
+<a name="238" href="#238">238</a>         
+<a name="239" href="#239">239</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="240" href="#240">240</a>             String outputString = 
+<a name="241" href="#241">241</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
+<a name="242" href="#242">242</a>             LOG.debug(outputString);
+<a name="243" href="#243">243</a>         }
+<a name="244" href="#244">244</a>         
+<a name="245" href="#245">245</a>         <strong class="jxr_keyword">try</strong> {
+<a name="246" href="#246">246</a>             verify(signedDoc, cryptoCA);
+<a name="247" href="#247">247</a>             <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> Exception(<span class="jxr_string">"Failure expected on issuer serial"</span>);
+<a name="248" href="#248">248</a>         } <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) {
+<a name="249" href="#249">249</a>             assertTrue(ex.getErrorCode() == WSSecurityException.FAILED_CHECK);
+<a name="250" href="#250">250</a>             <em class="jxr_comment">// expected</em>
+<a name="251" href="#251">251</a>         }
+<a name="252" href="#252">252</a>     }
+<a name="253" href="#253">253</a>     
+<a name="254" href="#254">254</a>     
+<a name="255" href="#255">255</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="256" href="#256">256</a> <em class="jxr_javadoccomment">     * Test signing a SOAP message using a BST. The signature verification passes, but the trust</em>
+<a name="257" href="#257">257</a> <em class="jxr_javadoccomment">     * verification will fail as the CA cert is out of date.</em>
+<a name="258" href="#258">258</a> <em class="jxr_javadoccomment">     */</em>
+<a name="259" href="#259">259</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testSignatureBadCACert() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="260" href="#260">260</a>         WSSecSignature sign = <strong class="jxr_keyword">new</strong> WSSecSignature();
+<a name="261" href="#261">261</a>         sign.setUserInfo(<span class="jxr_string">"wss4jcertdsa"</span>, <span class="jxr_string">"security"</span>);
+<a name="262" href="#262">262</a>         sign.setKeyIdentifierType(WSConstants.BST_DIRECT_REFERENCE);
+<a name="263" href="#263">263</a> 
+<a name="264" href="#264">264</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="265" href="#265">265</a> 
+<a name="266" href="#266">266</a>         WSSecHeader secHeader = <strong class="jxr_keyword">new</strong> WSSecHeader();
+<a name="267" href="#267">267</a>         secHeader.insertSecurityHeader(doc);
+<a name="268" href="#268">268</a>         Document signedDoc = 
+<a name="269" href="#269">269</a>             sign.build(doc, CryptoFactory.getInstance(<span class="jxr_string">"wss40badca.properties"</span>), secHeader);
+<a name="270" href="#270">270</a>         
+<a name="271" href="#271">271</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="272" href="#272">272</a>             String outputString = 
+<a name="273" href="#273">273</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(signedDoc);
+<a name="274" href="#274">274</a>             LOG.debug(outputString);
+<a name="275" href="#275">275</a>         }
+<a name="276" href="#276">276</a>         <em class="jxr_comment">//</em>
+<a name="277" href="#277">277</a>         <em class="jxr_comment">// Verify the signature</em>
+<a name="278" href="#278">278</a>         <em class="jxr_comment">//</em>
+<a name="279" href="#279">279</a>         <strong class="jxr_keyword">try</strong> {
+<a name="280" href="#280">280</a>             verify(signedDoc, CryptoFactory.getInstance(<span class="jxr_string">"wss40badcatrust.properties"</span>));
+<a name="281" href="#281">281</a>             fail(<span class="jxr_string">"Failure expected on bad CA cert!"</span>);
+<a name="282" href="#282">282</a>         } <strong class="jxr_keyword">catch</strong> (WSSecurityException ex) {
+<a name="283" href="#283">283</a>             <em class="jxr_comment">// expected</em>
+<a name="284" href="#284">284</a>         }
+<a name="285" href="#285">285</a>     }
+<a name="286" href="#286">286</a>     
+<a name="287" href="#287">287</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="288" href="#288">288</a> <em class="jxr_javadoccomment">     * A test for "SignatureAction does not set DigestAlgorithm on WSSecSignature instance"</em>
+<a name="289" href="#289">289</a> <em class="jxr_javadoccomment">     */</em>
+<a name="290" href="#290">290</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> testMultipleCertsWSHandler() <strong class="jxr_keyword">throws</strong> Exception {
+<a name="291" href="#291">291</a>         <strong class="jxr_keyword">final</strong> WSSConfig cfg = WSSConfig.getNewInstance();
+<a name="292" href="#292">292</a>         <strong class="jxr_keyword">final</strong> <strong class="jxr_keyword">int</strong> action = WSConstants.SIGN;
+<a name="293" href="#293">293</a>         <strong class="jxr_keyword">final</strong> RequestData reqData = <strong class="jxr_keyword">new</strong> RequestData();
+<a name="294" href="#294">294</a>         reqData.setWssConfig(cfg);
+<a name="295" href="#295">295</a>         reqData.setUsername(<span class="jxr_string">"wss40"</span>);
+<a name="296" href="#296">296</a>         java.util.Map config = <strong class="jxr_keyword">new</strong> java.util.TreeMap();
+<a name="297" href="#297">297</a>         config.put(WSHandlerConstants.SIG_PROP_FILE, <span class="jxr_string">"wss40.properties"</span>);
+<a name="298" href="#298">298</a>         config.put(<span class="jxr_string">"password"</span>, <span class="jxr_string">"security"</span>);
+<a name="299" href="#299">299</a>         config.put(WSHandlerConstants.SIG_KEY_ID, <span class="jxr_string">"DirectReference"</span>);
+<a name="300" href="#300">300</a>         config.put(WSHandlerConstants.USE_SINGLE_CERTIFICATE, <span class="jxr_string">"false"</span>);
+<a name="301" href="#301">301</a>         reqData.setMsgContext(config);
+<a name="302" href="#302">302</a>         
+<a name="303" href="#303">303</a>         <strong class="jxr_keyword">final</strong> java.util.Vector actions = <strong class="jxr_keyword">new</strong> java.util.Vector();
+<a name="304" href="#304">304</a>         actions.add(<strong class="jxr_keyword">new</strong> Integer(action));
+<a name="305" href="#305">305</a>         Document doc = unsignedEnvelope.getAsDocument();
+<a name="306" href="#306">306</a>         <a href="../wssec/TestWSSecurityGetPassword.html">MyHandler</a> handler = <strong class="jxr_keyword">new</strong> <a href="../wssec/TestWSSecurityGetPassword.html">MyHandler</a>();
+<a name="307" href="#307">307</a>         handler.send(
+<a name="308" href="#308">308</a>             action, 
+<a name="309" href="#309">309</a>             doc, 
+<a name="310" href="#310">310</a>             reqData, 
+<a name="311" href="#311">311</a>             actions,
+<a name="312" href="#312">312</a>             <strong class="jxr_keyword">true</strong>
+<a name="313" href="#313">313</a>         );
+<a name="314" href="#314">314</a>         
+<a name="315" href="#315">315</a>         <em class="jxr_comment">//</em>
+<a name="316" href="#316">316</a>         <em class="jxr_comment">// Verify the signature</em>
+<a name="317" href="#317">317</a>         <em class="jxr_comment">//</em>
+<a name="318" href="#318">318</a>         Vector results = verify(doc, cryptoCA);
+<a name="319" href="#319">319</a>         WSSecurityEngineResult result = 
+<a name="320" href="#320">320</a>             WSSecurityUtil.fetchActionResult(results, WSConstants.SIGN);
+<a name="321" href="#321">321</a>         X509Certificate cert = 
+<a name="322" href="#322">322</a>             (X509Certificate)result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATE);
+<a name="323" href="#323">323</a>         assertTrue (cert != <strong class="jxr_keyword">null</strong>);
+<a name="324" href="#324">324</a>         X509Certificate[] certs = 
+<a name="325" href="#325">325</a>             (X509Certificate[])result.get(WSSecurityEngineResult.TAG_X509_CERTIFICATES);
+<a name="326" href="#326">326</a>         assertTrue (certs != <strong class="jxr_keyword">null</strong> &amp;&amp; certs.length == 2);
+<a name="327" href="#327">327</a>         
+<a name="328" href="#328">328</a>         assertTrue(handler.verifyTrust(certs, reqData));
+<a name="329" href="#329">329</a>     }
+<a name="330" href="#330">330</a>     
+<a name="331" href="#331">331</a>     
+<a name="332" href="#332">332</a>     <em class="jxr_javadoccomment">/**</em>
+<a name="333" href="#333">333</a> <em class="jxr_javadoccomment">     * Verifies the soap envelope</em>
+<a name="334" href="#334">334</a> <em class="jxr_javadoccomment">     * &lt;p/&gt;</em>
+<a name="335" href="#335">335</a> <em class="jxr_javadoccomment">     * </em>
+<a name="336" href="#336">336</a> <em class="jxr_javadoccomment">     * @param doc </em>
+<a name="337" href="#337">337</a> <em class="jxr_javadoccomment">     * @throws Exception Thrown when there is a problem in verification</em>
+<a name="338" href="#338">338</a> <em class="jxr_javadoccomment">     */</em>
+<a name="339" href="#339">339</a>     <strong class="jxr_keyword">private</strong> Vector verify(Document doc, Crypto crypto) <strong class="jxr_keyword">throws</strong> WSSecurityException {
+<a name="340" href="#340">340</a>         Vector results = secEngine.processSecurityHeader(
+<a name="341" href="#341">341</a>             doc, <strong class="jxr_keyword">null</strong>, <strong class="jxr_keyword">this</strong>, crypto
+<a name="342" href="#342">342</a>         );
+<a name="343" href="#343">343</a>         <strong class="jxr_keyword">if</strong> (LOG.isDebugEnabled()) {
+<a name="344" href="#344">344</a>             LOG.debug(<span class="jxr_string">"Verfied and decrypted message:"</span>);
+<a name="345" href="#345">345</a>             String outputString = 
+<a name="346" href="#346">346</a>                 org.apache.ws.security.util.XMLUtils.PrettyDocumentToString(doc);
+<a name="347" href="#347">347</a>             LOG.debug(outputString);
+<a name="348" href="#348">348</a>         }
+<a name="349" href="#349">349</a>         <strong class="jxr_keyword">return</strong> results;
+<a name="350" href="#350">350</a>     }
+<a name="351" href="#351">351</a> 
+<a name="352" href="#352">352</a>     <strong class="jxr_keyword">public</strong> <strong class="jxr_keyword">void</strong> handle(Callback[] callbacks)
+<a name="353" href="#353">353</a>         <strong class="jxr_keyword">throws</strong> IOException, UnsupportedCallbackException {
+<a name="354" href="#354">354</a>         <strong class="jxr_keyword">for</strong> (<strong class="jxr_keyword">int</strong> i = 0; i &lt; callbacks.length; i++) {
+<a name="355" href="#355">355</a>             <strong class="jxr_keyword">if</strong> (callbacks[i] instanceof WSPasswordCallback) {
+<a name="356" href="#356">356</a>                 WSPasswordCallback pc = (WSPasswordCallback) callbacks[i];
+<a name="357" href="#357">357</a>                 <em class="jxr_comment">/*</em>
+<a name="358" href="#358">358</a> <em class="jxr_comment">                 * here call a function/method to lookup the password for</em>
+<a name="359" href="#359">359</a> <em class="jxr_comment">                 * the given identifier (e.g. a user name or keystore alias)</em>
+<a name="360" href="#360">360</a> <em class="jxr_comment">                 * e.g.: pc.setPassword(passStore.getPassword(pc.getIdentfifier))</em>
+<a name="361" href="#361">361</a> <em class="jxr_comment">                 * for Testing we supply a fixed name here.</em>
+<a name="362" href="#362">362</a> <em class="jxr_comment">                 */</em>
+<a name="363" href="#363">363</a>                 pc.setPassword(<span class="jxr_string">"security"</span>);
+<a name="364" href="#364">364</a>             } <strong class="jxr_keyword">else</strong> {
+<a name="365" href="#365">365</a>                 <strong class="jxr_keyword">throw</strong> <strong class="jxr_keyword">new</strong> UnsupportedCallbackException(callbacks[i], <span class="jxr_string">"Unrecognized Callback"</span>);
+<a name="366" href="#366">366</a>             }
+<a name="367" href="#367">367</a>         }
+<a name="368" href="#368">368</a>     }
+<a name="369" href="#369">369</a>     
+<a name="370" href="#370">370</a> }
+</pre>
+<hr/><div id="footer">This page was automatically generated by <a href="http://maven.apache.org/">Maven</a></div></body>
+</html>
+



Mime
View raw message